securitylinkindia

Invictus Camera Enlisted to Protect Endangered Sea Turtles

Endangered nesting green sea turtles are now being protected by 360 Vision Technology’s Invictus ruggedized Hybrid PTZ camera. The Invictus camera has been deployed as part of Security Centres International’s high-performance mobile advanced safety tower (MAST), rapid deployment camera solution, which is now installed on the Cayman Islands, British West Indies. The MAST unit was deployed after a funding campaign led by Caymanian, Michael Ridley, to install video surveillance at a key nesting beach at Sand Hole Road in Boatswains Bay. “Sand Hole Road is a critically important nesting beach for the female turtles, who crawl out onto the beaches to dig nests and lay eggs during the night,” explained Michael, “Unfortunately, poaching poses a constant threat to the survival of the nesting sea turtles at many locations. In addition, economic development of the island has seen more beach front property being built and a subsequent squeeze on places available for the turtles to nest safely after migrating long distances between feeding grounds. “After analysing the Cayman Islands Department of Environment (DoE) detailed nesting data accumulated over 20 years, to identify the most vibrant turtle nesting grounds, I selected the beach to implement a pilot program to monitor nesting turtles and protect them from poaching activity. The beach site has been dubbed, ‘Turtle Beach’ and provides a perfect nesting ground for turtles due to its minimal property development, zero light pollution, and enough sand and vegetation to support the turtles’ nesting activity.” “The Invictus based MAST solution was perfect for the application at the beach,” said Stuart Bostock, Executive Group President at Security Centres International, “Featuring world-class HD surveillance imaging from the 360 Vision Invictus camera, leading-edge design, robust build, zero infrastructure requirements and seamless video management system (VMS) integration, MAST is the only product of its kind. It’s also 100% self-powered, using solar energy and a 100-hour back-up battery; a feature supported by the use of the low power requirements of the 360 Vision Invictus camera.” Monitored 24/7, images from the camera enable DoE and Royal Cayman Islands Police Service (RCIPS) officers to be alerted and dispatched when nesting turtles arrive at the beach, assisting the DoE to monitor the beach and provide the highest level of protection against poaching. “We are all very confident that the data obtained from this project will prove invaluable in assisting the DoE with their conservation efforts and assist them with their Island-wide monitoring efforts,” continued Michael, “Sand Hole Road is a critically important nesting beach with poaching posing a constant threat to the survival of the sea turtles that nest there, so high-performance CCTV via the MAST solution was specified as the best way to protect them.” The MAST system was selected for deployment on the beach due to its excellent night-time surveillance capability, operating without the need for any supporting local infrastructure. Plus, the MAST system is silent in operation, posing no environmental impact, and thanks to the 360 Vision IR LED illuminator equipped Invictus camera, the system can operate without a visible light source that may disturb, or draw unwanted attention to the turtles nesting site. Mark Rees, Managing Director at 360 Vision Technology added, “The Invictus is a high-performance, ruggedized all-in-one PTZ camera with full 1080P HD and Predator ultra-low-light camera technology, making it the perfect choice for off-grid temporary/ rapid deployment mobile surveillance rigs such as MAST. Additionally, Invictus’ low-power consumption greatly assists the longevity of critical off-grid battery power when deployed in remote applications, extending MAST’s operational performance and meaning fewer maintenance visits to the camera, with the benefit of less disturbance to the green sea turtles. “The Invictus camera’s unparalleled mix of competitive cost and advanced functionality make it the perfect imaging component for the innovative MAST system, where it is now providing much needed surveillance protection and research video.” To date, the use of the MAST unit has proved a huge success in protecting the sea turtles from poachers and providing evidential video of the turtles’ feeding and nesting activity on the beach. Calculating population, nesting patterns and survival rates from the footage gained during this season, plans have already been made for additional protection measures and the extension of the MAST based surveillance program to other locations on the British West Indies island.  

Read More

IDIS Advanced Lightmaster Ptz Camera

IDIS is extending its award-winning DirectIP® camera range with the introduction of its new flagship 2MP 36x Lightmaster IR PTZ outdoor-ready camera for fast and precise pan/ tilt/ zoom performance. The new DC-S6283HRX Lightmaster builds on the specification of IDIS’s successful PTZ models, with a highgrade lens combined with advanced sensor technology and finely tuned, client-side image processing, allowing the capture of vivid true colour video in extremely low light conditions. Excellent performance at long distances, with minimum motion blur, makes the DCS6283HRX ideal for perimeters, shopping centres, stadia, outdoor spaces and public area applications. The camera benefits from IDIS’ signature true plug-andplay, one-click configuration and features 36x optical zoom, IR up to 350 metres, true wide dynamic range (WDR), digital image stabilization (DIS), a built-in heater and a vandal proof casing. “Designed for 24/7 accurate pan/ tilt/ zoom operation this new Lightmaster PTZ camera delivers unparalleled performance and exceptional detail when zooming. The camera is equipped with a variety of intelligent features and can move between pre-set positions and zoom in automatically in response to detected events. The result is maximum protection for a wide range of applications,” said James Min, Managing Director, IDIS Europe. The user experience is enhanced with IDIS Smart UX Controls, which is an award-winning, advanced and simple to use interface featuring intuitive slingshot and rubber-band style controls. Operators can smoothly and seamlessly follow moving objects in real-time with ground-breaking accuracy by panning images at different speeds and in different directions – literally without lifting a finger – by using a CTRL button and mouse combination. The camera uses H.264 and H.265 combined with IDIS Intelligent Codec to deliver significant bandwidth and storage savings and benefits from low Power-over-Ethernet (PoE) energy consumption. The risk of gaps in footage is eliminated with IDIS Smart Failover. In the event of network instability, the camera automatically records data to an integral 256GB SD card and transfers it to the network video recorder (NVR) once connection is restored, which avoids the need for engineer call outs to retrieve footage. “We are listening and responding to customer demands with our new 2MP PTZ Lightmaster camera, providing an easy to deploy, low-storage and bandwidth solution for wide area coverage and perimeter detection,” continued James Min, “It’s particularly suited to town centre and city surveillance, stadia, outdoor retail parks, manufacturing and logistics sites and high-security perimeter applications where outstanding performance and ease-of-use combined with a low total cost of ownership are becoming essential.”  

Read More

Securing IP Surveillance Cameras in the IoT Ecosystem

The security for devices connected to the Internet of Things (IoT) has been a hot topic, and Internet Protocol (IP) surveillance cameras, in particular, have been the subject of growing scrutiny. IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed-denial-of-service (DDoS) attack in history. As a result, packet flow experienced outbursts of up to 50 times higher than its normal volume, with internet traffic estimated at a record high of 1.2 Tbps. The traffic was triggered by remote commands, and the hijacked devices were primarily IP surveillance cameras. Multiple variants of Mirai-like malware have since surfaced to further take advantage of vulnerable IP surveillance cameras. Rightfully, cybersecurity is now becoming a major consideration for IP surveillance devices, with some governments, for instance, already at work on regulations to elevate cybersecurity implementation. It is becoming a new decisive factor in the market of IP surveillance cameras. Motivations for targeting IP surveillance cameras One of the major motivations for hacking IoT devices is financial gain; and when it comes to monetization, IP surveillance cameras are distinct targets for the following reasons: Constant connectivity Like many other devices, IP cameras need to be internet-connected to function properly. However, exposure to the internet also makes it easy for hackers to find the cameras and potentially exploit the devices. Once hacked, the devices will be able to serve the hackers’ needs. Low hacking investment Unlike with hacking a PC, once hackers see a way to break the security of an IoT device such as an IP camera, the same approach can usually be applied to other devices of similar models, resulting in a very low per-device hacking cost. Lack of supervision Unlike PCs, especially those used in offices, IP cameras have low user interaction and are not well-managed in terms of security. Installation of an after market anti-malware application is not available either. High performance The idle computing power of an IP surveillance camera is usually good enough to perform hacking-related tasks such as cryptocurrency mining, and without being noticed by end users at that. High internet-facing bandwidth The always-connected, fast and huge bandwidth designed for video communications makes for a suitable target for hackers to initiate DDoS attacks. Typical attack chain The typical attack chain around IP surveillance cameras consists of the following steps. 1.      Initial infection After locating a device with open ports such as Telnet, Secure Shell, and Universal Plug and Play (UPnP), the attacker uses the device’s default credentials (as with Mirai), or exploits un-patched system vulnerabilities (as with Persirai and Reaper) to gain access control. 2.      Command and control After gaining control of the device, the attacker downloads and executes malicious scripts or samples that report to the command-and-control (C&C) server. That server issues commands instructing the affected IP camera to perform malicious activities such as cryptocurrency mining or DDoS attacks on other devices via user datagram protocol floods. 3.      Propagation Depending on its kind, the malware used can scan the network and employ the same infection methods to propagate itself to other vulnerable devices. The attacker can trigger this action automatically (as in the case of wormlike botnets), or manually by receiving instructions from the C&C server. Risks to public and closed networks Most home IP cameras offered in the traditional, doit-yourself (DIY) consumer market are connected directly to the internet. This means that home IP cameras are exposed to the internet at a very similar level as personal computers in homes, but lacking the user capability to install security software. Although home IP cameras amount to only a small portion of all installed devices, they make up a fast-growing market because of their increasing affordability and accessibility to the general public. On the other hand, many people claim that IP cameras are not exposed to that level of risk because most products are usually designed for enterprises, which basically deploy IP cameras in local area networks and make them unsearchable on the internet. This claim may hold true, but it may overlook several real-world factors: The system integrators may not install the IP cameras as expected. In many cases, people just choose whichever approach is more convenient for them to install everything and get the devices working. Ease of maintenance is another incentive for them to do so. This explains why the IP addresses of many IP cameras that are supposed to stay in a local area network can still be found. The business model around IP cameras is changing. Service providers are using IP cameras to run customized services (such as elderly care), and making the cameras available on the internet is the easiest way for both users and remote operators to access the cameras as needed at the same time. Modern value-adding functions such as video analysis features are often deployed in the cloud to reduce the overall hardware and software costs, with the flexibility to switch specific features on or off, or to add a new feature regardless of the hardware performance of the cameras. Hooking up IP cameras to the internet at large is a clear trend. Given the considerable number of IP cameras deployed globally, a small portion of IP cameras that expose themselves on the public domain can serve as a great incentive for hackers. Another thing to consider is how network isolation is one of the frequently mentioned approaches for cybersecurity. Being in a local area network though, does not guarantee the protection of IP cameras against hacking. For one thing, well-designed malware can easily spread across the local area network, and any portable device brought into the same local area network can easily turn into an infection vector. Take the infamous Mirai botnet as an example – a Windows-based trojan plays an important role to distribute it, even though the targets are…

Read More

Pivot3 Large-Scale Surveillance Solution Recognized for Innovation in Campus Safety

Pivot3 large-scale surveillance solution has recently received the 2019 Campus Safety Best Award, which recognizes the most innovative solutions designed to enhance security and safety in campus environments. Selected for demonstrating excellence in the video surveillance category, Pivot3’s large-scale surveillance solution provides the performance that is required for largescale environments at a lower cost than any other enterprise solution. This honor marks the fourth award Pivot3 has received for the large-scale solution within the past year, after it was also recognized as a 2018 Innovative Product Award winner at Global Security Exchange, a 2018 ASTORs award honoree and the recipient of BUILDINGS Magazine’s 2019 Money-Saving Product award. The large-scale surveillance solution was designed to support video surveillance and IoT security deployments of 500TB or more, which is typical of large organizations such as education or healthcare campuses. With the Pivot3 solution, campuses can streamline enterprise-scale video and IoT deployments by hosting video management software, and other security and IT applications and storage on a modular, scalable appliance. This significantly lowers cost and delivers higher rack density for multi-PB video installations with the lowest price point in the market for scalable video surveillance infrastructure.Pivot3’s intelligent infrastructure is designed to handle the resilience and performance requirements of video surveillance, security and IoT applications, where compliance and data protection are paramount. Pivot3 ensures video integrity is delivered constantly, without interruption or degradation. If multiple hardware failures occur, servers remain online, and previously recorded data is protected and available if needed for forensic purposes. Pivot3 also supports mixed workloads and can host multiple security and traditional datacenter applications on a single device, delivering significant return on investment for organizations across the globe. “Complex campus environments depend on a security solution that is user-friendly, cost-effective and scalable to create the foundation for safe campuses,” said Brandon Reich, Vice President, Security and IoT, Pivot3, “This recognition helps drive more opportunities to provide intelligent infrastructure solutions that improve safety, reduce risks and liabilities and improve incident response times.”  

Read More

M&A in Defence & Security Market Reaches Record High

Mergers and acquisitions (M&A) activity in the defence and security domains was valued at USD130 billion during the three months to 30 June 2019, according to Jane’s by IHS Markit. This compared with USD5.4 billion during the prior three months and an average of USD10 billion each quarter over the prior ten years. The merger of Raytheon and United Technologies Corporation (UTC) in a USD121 billion all-stock transaction was announced in June this year to create Raytheon Technologies Corporation with combined sales in the region of USD74 billion. The deal will create what will be one of the largest defence organisations worldwide and followed UTC’s absorption of Rockwell Collins in 2017. “Even with the merger of Raytheon and UTC excluded, activity during the three months to 30 June was strong,” said Guy Anderson, Associate Director at Jane’s  by IHS Markit, “Other transactions were valued at a total of USD9 billion and included CapGemini’s USD3.5 billion purchase of engineering and research and development group Altran and Parker-Hannifin’s USD3.6 billion acquisition of military adhesives and coatings group Lord Corporation.” Beyond market shifting activity at the top of the US defence sector, activity during the quarter pointed towards nascent consolidation in Saudi Arabia, ongoing consolidation in India and continuing moves by defence primes to acquire a presence in ‘disruptive’ sectors such as alternative propulsion and artificial intelligence. Ongoing hard line by regulator hampers transformational activity in North America Despite the scale of transformational activity in the US, deal activity in North America dipped during the second quarter to the lowest level in five years and accounted for just 31% of transactions (based on the location of targets). This marked a decline from a five-year average of 50%. As noted in previous reports, this appears to reflect the ongoing hard line by US regulators in scrutinising mergers and acquisitions on anti-competition grounds. Jane’s notes a contrast in European activity, which jumped to the highest level in two years (38% of global transactions). Beyond Europe and North America, activity in the Asia Pacific region jumped to the highest quarterly level ever recorded by Jane’s with 24% of transactions. “Further transformational activity cannot be discounted over the course of the year, although competition and inward investment oversight in the world’s largest defence market may act as a partial brake,” said Anderson, “Greater consolidation can be expected in both Asia Pacific and the rest of the world as markets continue to mature and governments seek to invigorate domestic defence activity.”  

Read More

Hikvision Announces Half-yearly Financial Results with 14.60% Growth

Hikvision, the world’s leading provider of innovative security products and solutions, has reported a total operating revenue of RMB 23.92 billion for the first half of 2019, representing a year-over-year (YoY) growth of 14.60%. Net profits attributable to shareholders of the company amounted to RMB 4.22 billion, a growth of 1.67% YoY. The company also reported strong financial performance during the second quarter of 2019, with 21.46% growth YoY in total operating revenue and 14.98% growth YoY in net profits. The company performed a retrospective adjustment or restatement of previous accounting data for business merger under the common control and the first implementation of new financial instrument guidelines. The company maintained strong investment in R&D and accelerated development of trending technologies such as deep learning, big data and intelligent IoT, which will enable the company to stay ahead of the curve in innovation for the security industry. During the first half of 2019, the company further strengthened its operations at home and abroad with continued investment in local sales, marketing and customer services operations. Hikvision also sees its new businesses – EZVIZ, HikRobotics, Automotive Electronics, and Intelligent Storage – continue to flourish, gradually becoming a new source of development and long-term growth.  

Read More

Einstein Concept House

A typical residential complex security system consists of premises access control and video surveillance. Such measures are impressive but not capable of stopping prepared burglars. SAGA Development and Ajax Systems have implemented a truly safe housing project based on the Einstein Concept House residential complex. The territory, corridors and stairs remain under 24/7 surveillance. Every apartment is equipped with Ajax security system devices. An internal security service instantly responds to its alerts. Einstein Concept House has no fence. It is not needed as every meter of the territory is monitored by cameras, and the guards are always nearby. An outsider would have a hard job entering the building since the entrance doors are equipped with fingerprint scanners. Furthermore, they will need a magnetic card to use an elevator, enter a staircase, or get to the necessary floor. The property of the residents is pro tected by Ajax security systems. Hub Plus hubs, DoorProtect door opening detectors, and MotionProtect motion detectors are installed inside every apartment. Ajax systems are not vulnerable to power outages or frequency jamming. They are always connected to the Ajax PRO Desktop central monitoring station that is monitored 24/7 by an internal security service operator of the residential complex. If thieves manage to gain access to an apartment despite all the security measures, Ajax will immediately send an alarm to the residents’ smartphones and the monitoring station. Elevators and exits from the floors will be blocked within 30 seconds, and the burglars will have to deal with the security guards of the complex and the police. The building has a centralized fire protection system. It can be reinforced with Ajax FireProtectPlus detectors that react to smoke, rising temperature, and carbon monoxide. Every apartment is equipped with Ajax LeaksProtect detectors. The security service will remotely shut off water supply to the apartment once a leakage is detected, and the owners will receive an incident alert. All plugs in Einstein Concept House apartment have built-in WallSwitch relays. The residents need not worry about a forgotten iron, curling tongs, or other electrical appliances. The users can turn the power supply on and off remotely via an application and monitor energy consumption using the smart relay. Furthermore, the relay protects the equipment from power overload and the plug from overheating and catching fire. The apartments with pre-installed Ajax systems can be supplemented with optional devices at the request of the residents such as detectors, smart plugs, key fobs, and keypads for system control. All Ajax security system devices are wireless, so the equipment can be connected within minutes and the connection process does not affect indoor decorations.  

Read More

The O2 Arena Awards Protective Services Contract to Securitas

Securitas UK has been awarded a five-year contract to deliver protective security services for The O2 arena. Home to world class entertainment, the 20,000-capacity venue hosted over 9 million visitors, 168 event days and 194 performances in 2018. Owned by AEG, The O2 arena is a high-profile venue which welcomes visitors from all around the world. The contract with Securitas went live in June. Craig Robb, Chief Commercial Officer at Securitas UK commented, “The O2 arena is one of the most recognised venues for out of this world entertainment, and we are committed to maintaining and enhancing this well-deserved reputation. “During the tender process, The O2 made it clear that they were looking for a best-in-class security supplier to keep their venue and visitors safe. They needed a provider that understood the challenges of operating in a complex and unique entertainment environment. “We’re delighted to welcome our new officers to the Securitas team – these officers are at the heart of our security delivery. “Through industry leading security officers and a highly experienced local management team, Securitas will deliver unrivalled protection at The O2 arena, creating a safe, secure and enjoyable environment for everyone.” Paul Williams, Senior Security Manager at The O2 commented, “We’re delighted to appoint Securitas UK to supply security and stewarding services to ensure the safety of our visitors at The O2 arena. As the world’s most popular music and entertainment venue it’s essential we work with a supplier who shares our values and we are proud to work with Securitas UK, the leading global security provider who deliver integrity, vigilance and helpfulness.” In addition to The O2 arena, Securitas delivers a range of protective security services for Formula 1, Wembley Stadium, Arsenal FC and works closely with the FA on event security.  

Read More

NEC Autonomous Backhoe Operation System Improves the Safety of Construction Sites

Obayashi Corporation, NEC Corporation and Taiyu Co., Ltd. have jointly developed an autonomous backhoe operation system that automates sediment loading as an important step in the autonomy of construction machinery. In recent years, labor shortages due to the aging of skilled workers and a decline in the number of younger workers have become urgent issues for the construction industry in Japan. As a result, labor-saving measures for the improvement of productivity have become increasingly important. For this reason, there are great expectations for the automation of construction technology, especially for the development of technology to automate heavy machinery that is currently operated by technically skilled workers. In order to address these issues, Obayashi, NEC, and TAIYU began joint development of technologies for automating general-purpose construction machinery, aiming to dramatically improve productivity while capitalizing on their collective experience and technological know-how. As an important first step, the companies have developed an autonomous operation system for backhoes. The autonomous backhoe operation system automatically carries out sediment loading, which represents a large amount of work for civil engineering projects such as tunneling, underground excavation for large-scale buildings, and other purposes. Sediment loading requires a high degree of skill in order to effectively control backhoes’ arms, booms, and buckets, making it difficult to achieve autonomy. Therefore, NEC applied its adaptive predictive control technologies to a general-purpose remote control device, the surrogate, which was jointly developed by Obayashi and TAIYU, for installation on backhoes. This system combines Obayashi’s know-how of sediment conditions and dump trucks in order to perform controls that take into account backhoe dynamics and constantly changing conditions. In addition, the use of know-how of technically skilled workers and AI technology has enabled the highly accurate remote control of actions conventionally carried out by technically skilled workers, such as excavation and loading. This system is scheduled to be applied at a civil engineering site managed by Obayashi in December this year. Features of the autonomous backhoe operation system include the following: Accuracy, safety and high productivity The autonomous backhoe operation system uses 3D scanners to check the status of embankments in an excavation area. The system determines the points at which the amount of sediment loaded per excavation is maximized, excavates the sediment, swivels to a dump truck standing by, and repeatedly loads the dump truck while monitoring progress by camera. In order to improve the accuracy of operations, the system produces a series of optimal operation plans and utilizes NEC’s Adaptive Predictive Control techniques to understand the dynamic characteristics of the backhoe. In addition, the system analyzes the work data of a large number of skilled technicians to quantify the efficiency of their operations, in addition to analyzing sediment conditions, correct it according to the position of the dump trucks or backhoes, and other conditions in order to realize higher productivity. When the sediment loaded into a dump truck reaches a specified weight, work stops automatically until another dump truck arrives. Therefore it is not necessary for personnel to enter a worksite, which helps ensure safety as well as productivity. In the unlikely event of a worker’s entry, Obayashi has installed the ‘QuattroEyes’ system, which was developed by Obayashi, to ensure safety by preventing contact through fail-safe measures. Easy autonomy compatibility This system enables backhoes to be operated through a general-purpose remote control, the surrogate, developed jointly by Obayashi and TAIYU. The surrogate is attached to the control levers of a backhoe and is compatible with any manufacturer or model. Therefore, the autonomous backhoe operation system can be mounted on any commercially available backhoe, regardless of the type of the system. Since automatic operation and remote control can be easily implemented or removed, it is possible to quickly and flexibly respond to sudden events or complicated operations that require manual control as well. Integrated control system that saves labor The autonomous backhoe operation system is managed by a networked control system that integrates and controls a large number of sensors for recognizing the conditions of work areas and construction machinery. Therefore, it is possible for the administrator to remotely check and manage large amounts of information from multiple viewpoints. In the future, next-generation communications, ‘5G,’ will enable faster, larger-capacity, and lower-delay communication, allowing multiple types of construction machinery to operate autonomously at the same time, helping to further improve productivity and labor savings. Going forward, Obayashi will promote the development of next-generation construction production systems capable of realizing high-productivity and high-safety even with few technicians. In the future, the company aims to contribute to solving the shortage of technically skilled workers problem in the construction industry through sales of these systems. NEC will leverage the results of this collaboration to develop solutions that can be used to improve the efficiency and safety of construction work. Moreover, NEC will utilize network flexibly to accelerate the provision of ‘NEC Smart Connectivity,’ which dynamically links data to people and goods as it creates new social value. TAIYU aims to promote the expansion of remote and autonomous operations for a wide range of construction equipment through the training of skilled operators, development of surrogates and other innovative new technologies.  

Read More

Motorola Solutions & Avigilon Corporation Selected to Help Protect Students

School district deploys a complete video security and critical communications solution to enhance safety for students, staff and faculty across its 20 locations Motorola Solutions and Avigilon Corporation have been selected to help protect Georgetown County School District (GCSD) in South Carolina, USA. Serving over 9,500 students throughout its 10 elementary schools, 4 middle schools, 4 high schools, career center and adult education center, GCSD sought to undergo a major security upgrade to increase safety, help mitigate misconduct, and offer greater ease-ofuse for school administrators, security officers and law enforcement officials using the security system. To enhance safety throughout its locations, a complete Avigilon video security system was deployed with over 1,000 cameras including the H4A bullet with self-learning video analytics, H4 mini dome and H4 fisheye cameras, all which helped achieve a tailored security solution for each location while allowing school security operators to leverage the benefits of real-time analytics. Avigilon Control Center™ video management software was also deployed to provide a more efficient way to manage video from a central location. GCSD also uses Motorola Solutions XPR 3500e radios across its locations. If suspicious activity is flagged using the Avigilon solution, security operators can quickly contact each other using the Motorola Solutions radios and take immediate action to keep students and staff safe. By using the two systems together, school officials can seamlessly improve operations from the time an emergency call is placed until after an incident is resolved. “Georgetown County School District is an excellent example of how Motorola Solutions and Avigilon provide a unified security solution for schools,” said John Kedzierski, Senior Vice President, Video Security Solutions at Motorola Solutions, “We are committed to continuing to develop products and technologies that can help enhance school safety and protect what matters most: students, staff and faculty.” “The ability of Avigilon and Motorola Solutions to provide an integrated solution for security, and critical communications is quite unique and extremely valuable to us,” said Alan Walters, Executive Director, Safety and Risk Management at GCSD, “We selected this system knowing that it is designed with every step of the response process in mind, which can make a world of difference in the moments that matter most.”  

Read More