securitylinkindia

Why are Shopping Malls Easy & Lucrative Targets for Terrorists ?

In the 21st century, shopping malls have become the symbol of prosperity. They are omnipresent across the globe – especially in metropolitan cities. India, which is one of the fastest growing economies of the world today, is also not lagging and has made a remarkable part of this global phenomenon that is fast spreading its footprints in Tier-II and Tier-III cities of the country. Shopping malls are also transforming the landscape of rural India. The nondescript and sleepy towns have become vibrant and are buzzing with commercial activities with population drawn to the ambience of flowing music, entertainment, glitter of lights, and opulence of the variety in the stores. Today malls which have become synonymous to shopping culture across all sections of urban India present a potent symbol of rising middle class, and have become the ultimate destination for the shoppers with wish lists in their hands. Other side of the coin – Easy target for terrorist attacks While visiting shopping malls is normally a must in today’s time, they have also become an easy target for terrorist attacks. The brazen and gruesome attacks by terrorists on shopping malls in the past decades have left a very tragic, devastating and emotionally wrenching scars down the memory lane of the entire human race. An analysis by Rand Corporation in 2006 reported 60 such attacks on shopping malls in 21 countries since 1998. A mere glance at the historical data of such heinous acts of terrorists as available on Google and tabulated below is very scary, and needs serious attention of the security professionals. Peculiarities of shopping malls The shopping malls are very different from the likes of airports which provide specific and specialized customer services and travel experience. Same is the case when we compare shopping malls with shopping complexes which fall grossly short of quality shopping experiences. The shopping malls are prominently crowd centric as footfalls are the core of their business model. They are usually fat in area – spread in lakhs of square feet of retail space, and multi-storeyed – to house a remarkably large number of stores to ensure all famous international brands are available. Food courts and cineplexes, casinos and pubs, kids play zones, promotional activity zone etc. are the major attractions of malls. Other facilities include large multilevel parking spaces for vehicles, gen sets for power back-ups, escalators and passenger lifts for easy movements of the shoppers, 24×7 presence of the security and facility management personnel, flashy glitter of colorful LED lights in stores and surroundings, and so on. Security challenges in shopping malls To be commercially viable and attractive, the shopping malls have got inherently to be in open areas – with wide ranging access for retailers and shoppers and therefore with copious car parking capacity and other above given facilities. This increases the potential vulnerability and challenges before the security system. Some of the other major challenges faced by the security in a shopping mall are: a) Multiple stakeholders – The ownership of the shopping malls is usually in the hands of many stakeholders. b) Large crowd – The sheer numbers are sitting ducks that invite terrorist attacks. c) Access to public – Malls thrive on footfalls and thus allow unimpeded access to all. d) Centre of attraction – Attract wide cross section of the population. e) Business models – The marginal cost of additional security measures is termed extremely high. f) Personal privacy vs security – Frisking, search and X-ray scanning of baggage are generally not longed for by the shoppers and hence rarely allowed. g) Unwillingness for enhanced security – Most countries are not willing to turn shopping malls into fortresses for various obvious reasons. Risks and threats The spectrum of risks and threats to the security of a shopping mall can thus be summarized in terms of – shop lifting by shoppers, theft and pilferage by the employees of stores, accidents and thefts in car parking, public violence in casinos and pubs, fire incidents for varied apparent reasons, bomb threats and active shooter incidents, inappropriate behavior in passenger lifts and parking amounting to sexual harassment, and many more. Active shooter Amongst the risks and threats listed above, active shooters are the biggest security threat. They are highly trained, hard core, motivated and mission oriented crusader with a singular aim to damage public and their assets. The characteristics of a shopping mall offer them the freedom to gauge the security envelope through repeated reconnaissance and surveillance of the target points and areas, and then strike at right place and time of his choosing within the vulnerabilities identified.   Post 9/11 scenario The aftermath of 9/11 attack on Twin Trade World Towers, New York in the USA, which shook the mindset of a large section of countries, has enabled a dramatic change in the entire security outlook of these infrastructures. The profile of the shopping malls has started deeply embedding security and safety in their processes to leave very marginal and reduced scope of security lapses. The HHMD (hand held metal detectors), DFMD (door frame metal detectors), X-ray scanners and CCTV surveillance play the key role in reinforcing todays’ security umbrella. The AI (Artificial Intelligence) enabled systems for tracking a suspect through facial recognition technology is the latest addition to the recent fleet of security gadgets. The scope of integrating security and surveillance devices has further augmented the viability of security system. The presence of security personnel in civil clothes to ensure that they remain unobtrusive and un-conspicuous while attempting to identify suspicious elements within the Mall serves a big deterrent. However, one needs to home on the ideology of terrorists to figure out the probability of an imminent terrorist attack. Why a shopping mall cannot be made an impregnable fortress A one line answer suffices to address this issue that a stringent security arrangement goes totally against the ethos, culture and experience level expected by both shoppers and retailers – as with such deployments the very purpose of creating malls…

Read More

Bosch Video Security and Access Control

Bosch helps Moscow create a new urban living experience video security and access control It is one of Moscow’s most ambitious building projects – the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalizes the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project. The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. From the security manager’s perspective, the main challenge was to ensure that these dis parate systems would function together and allowed for central management of a wide array of functions such as access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Aside from the project’s complex technical ramifications, there was a particular system design challenge. Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the autodome IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in intelligent video analytics. The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch video management system (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the access engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customized set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.  

Read More

Vanderbilt SPC: Protecting Staff Under Duress

Staff protection is a critical priority for all businesses. But some sectors need to provide their staff with more protection than others. For instance, financial institutions like banks, post offices, and credit unions can be under threat from break-ins and robberies while other areas such as 24-hour fuel stations or factories have staff on premises working throughout the night. Therefore, if a robbery was to occur during these unorthodox working times, it is vital that the alarm can be raised, and help can be provided immediately. Traditionally the method for signaling a threat was a member of staff would trigger a silent alarm that would be reported to police, or staff would enter a unique duress code. These code option and the silent panic/ hold up are available on the SPC system. That said, an often-reported issue with duress codes is that adding a one-to-four-digit number can be challenging to perform when under pressure. Vanderbilt’s SPC However, Vanderbilt’s SPC intrusion system has several features that help protect staff. One such feature is the ‘All okay’ function. Simply put, this is a step that staff can perform to signal everything is ‘okay’ when the SPC system is unset. The nice thing about this is that SPC allows this ‘All okay’ signal to be almost anything. Additionally, you can add multiple elements that will trigger the signal. The SPC system can be configured to have this functionality for specific areas and the time and action can be defined for what will happen if the signal is not given. Any input or zone can be used. SPC: How it works For example, at a bank, if the manager arrives early, he uses his card to gain access to the branch office and PIN to disarm the alarm. His code disarms the office and secure area but the ATMs, vaults, and safe deposit boxes remain armed. A central monitoring station (CMS), is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager in live video as he executes a predetermined security procedure and until he hits an ‘All Okay’ button. If there is a problem, a silent duress alarm is automatically sent. The monitoring station listens in and if necessary calls the police. The core element here is that it is easy for staff to remember not to perform an action and also more natural.  

Read More

Installation of Matrix Satatya Samas at NHIF

The National Health Insurance Fund (NHIF) is a social health insurance scheme established by CAP 395 with the main objective of ensuring accessibility of health care services to all Tanzanians. The Fund has managed to expand its coverage to include councillors, private companies, religious and education institutions, private individuals, children under 18 (TOTO Afya) as well as mutual groups, whereby all members can equally access health services in all accredited health facilities. The Fund is also administering the Bunge Health Insurance Scheme, on behalf of the National Assembly. Business scenario and challenges NHIF is a prestigious public institution that serves people all over Dar es Salaam and Tanzania. It has multiple sites spread over these regions. Their current surveillance platform had a few limitations of integrating third party cameras and was not facilitating centralised monitoring for multiple locations. This posed a problem in managing and monitoring all sites from a single location. For this, they needed a surveillance platform that could easily integrate with multi-brand cameras as well as facilitate multi-location monitoring. Moreover, they needed a system with monitoring capacity of over 500 cameras with the facility of remote management for real-time security. Solution offered To the above challenges, Matrix offered SATATYA SAMAS video management system. It is a video surveillance management solution specifically designed to meet the diverse and complex needs of large enterprises having multiple sites connected to a central location, or a large single site. The system was able to integrate with 56 AXIS cameras available at its Headquarters and other 16 cameras available at its district branch offices. All the cameras were managed at single central server located at the NHIF HQ office. Matrix VMS provided real-time security with intelligent video analytics such as motion detection, intrusion detection, trip wire etc. Additionally, vms enabled monitoring and managing video surveillance from mobile phones and tablets remotely by using Matrix mobile application – SATATYA VISION. These features made monitoring much more reliable and easier for them. Project highlights VMS simultaneous user licence – 3 Qty. Mobile App (SATATYA VISION). Intelligent video analytics. Benefits Retention of existing security infrastructure. Reduces storage consumption with cost saving features. Centralized monitoring and management. Real-time security.  

Read More

Drone with Allied Vision Camera Supports in Flood and Coastal Protection

Heavy rain and storms resulting in flooding, have increased significantly in recent years. When large quantities of rainfall in very short periods of time, masses of water overrun sewage capacities in many areas and allow water bodies to rise over their banks, often with destructive force and disastrous effects. Emergency responders on scene, then face the task of coordinating aid and protection measures as efficiently as possible. However, affected areas are often inaccessible, and situations are unwieldy. Real-time data and images from the air, combined when possible with further sensor data on the ground’s condition, for example, would provide emergency responders with valuable information and allow them to intervene where it would be most prudent. Engineers Martin Becker, Simon Batzdorfer and Markus Bobbe of the Institute of Flight Guidance at the Technische Universität Braunschweig (TUBS) and Jan Schattenberg, Hannes Harms and Julian Schmiemann from the Institute for Mobile Machines and Commercial Vehicles, also at TUBS have taken up this topic and developed an automated exploration system. The DLR Space Administration was promoting the engineers’ project with approximately one million euros funding from the Federal Ministry of Economics and Energy, to work on an exploration system in cooperation with AirRobot GmbH & Co. KG from Arnsberg, Germany. Generating aerial recordings in catastrophe-stricken areas such as flood zones, using automated unmanned aircraft plays a meaningful role in the exploration system. Combined with ground-based systems, information regarding the situation in affected areas can be collected to support emergency responders at the affected location. All data collected from aerial and ground units can then be represented within a single map and made available to emergency response personnel. High-resolution aerial images for rapid aid A Manta camera from Allied Vision onboard the drone Hugin delivers images from the air. The project team chose the drone’s name deliberately; in Norse mythology, The Manta camera combines high resolution with low weight, factors that mattered to the system’s developers. Hugin should carry as little additional weight as possible, to minimize the interference on the operation time. Depending on the external conditions, Hugin can remain in the air for up to 30 minutes without recharging. Secure communication via its command link, is guaranteed within a range of a kilometer. Equipped with a control system based on positional data, the drone is able to safely navigate a predefined route, even in challenging environmental conditions and with peak win loads, at up to 12m/s. During the flight, individual images are recorded from altitudes of usually 100 meters, depending on the application. All obtained images are then processed to generate a continuous overview of the entire application area. Due to the automatic exposure adjustment functionality of the camera, even changing light conditions are manageable. Since comprehensive image preprocessing (i.e., image optimization, light correction, white balance, color correction, binning, decimation) takes place within the camera, information-rich two-dimensional images are transmitted to the base station, located on the ground. In addition, a self-developed local communication network is used, which enables targeted information exchange, based upon different communication technologies. During catastrophic events, emergency responders can evaluate the situation better and more quickly with the aid of these images. Since they can see where protective measures must be taken or increased, they can initiate the necessary steps. In case of emergency, system operation must be fast and intuitive. The system determines the flight path based on just a few parameters, so that the emergency services have as little effort as possible to control the drone. The response team leader can easily choose the area to fly over at the system’s ground station. Flight planning then is automatically performed, incorporating all mandatory parameters e.g., opening angle of the lens, to ensure a minimal defined overlap for photogrammetric processing of the obtained images. The drone follows the flight path automatically, and the (live) evaluation of the images is subsequently triggered automatically, too. Within the ground station, the user can specify the actually piloted drone and to select data streams, which are then provided in real time including aerial imaginary or other sensor data. Successful tests in practice The Stadtentwässerung Braunschweig GmbH was confronted with serious flooding in the summer of 2017 and urgently needed information on current water levels near the Okerriver’s course through the city. They requested help from the TU Braunschweig via an existing contact at the Braunschweig fire department. One particularly endangered area (from the Eisenbütteler Wehr to the Volkswagen Halle) was surveilled and documented in a variety of aerial images. The Stadtentwässerung thus gained knowledge not just about how the flooding had spread, but could also retrace whether protective measures undertaken during the prior flooding in 1994 were now successfully taking hold. Based on the images, important decisions could be made, and questions answered such as – must warnings be issued, are closures required, at which locations are sandbags necessary, and via which routes are these regions even accessible? In the future, the Braunschweig Stadtentwässerung would also like to take advantage of the Braunschweig TU system for long-term observation of flood protection measures and to review prognosis models. In another application case, the Braunschweig TU research team successfully tested Hugin in the field of coastal protection. On the East Frisian island of Langeoog in the southern North Sea, a flyover produced revealing aerial images of dunes and dykes. One item that drew particular attention was a beach nourishment taking place at the time. During one flushing procedure, numerous aerial images were made of the location that clearly demonstrated to local coastal protection authorities just how close the tide came to the dunes in the still unfinished area of the beach nourishment, and in the same moment, how far the surge was removed from the dunes when the beach level had been raised by additional sand. The TU Braunschweig engineers are already considering other applications and further constraints. Thus, the drone can be equipped with a thermal imaging camera, for example, to be able to find injured persons in the dark.  

Read More

Delta DSC600 Bollard Stops Truck

Recently a truck crashed into a Delta Scientific DSC600 bollard protecting the Old Capitol ground in Tallahassee. The vehicle went no further than the bollard itself, stuck on top so well that it took two other trucks to remove it. The driver survived. “DSC600 bollards protect the Capitol grounds and their aesthetics with K-12 defense that meets or exceeds U.S. Department of State and Department of Defense certifications,” affirmed Greg Hamm, Delta Scientific Vice President of Marketing and Sales, “With the DSC600 crash rated bollard modules, facilities surrounded by streets, abutting sidewalks and set back on lawns such as many state capitals, other government structures, stadiums, theaters and commercial buildings, can now be effectively protected.” With a foundation only 14 inches (35.5 cm) deep versus the four feet (1.2 m) typically required, Delta’s DSC600 shallow foundation high security bollards can be installed within sidewalks, on top of concrete deck truss bridges or in planters. They can also conform to varying inclines and turns of a locale. The new 2-bollard modules, which can be arrayed in whatever length is required, will stop and destroy a 15,000 pound (66.7kN) truck traveling 50 miles per hour (80kph).  

Read More

IndigoVision Upgrades a Major Airport from an Analog to IP System

Faced with a number of security challenges and planned future expansion, a major airport decided to implement a scalable security surveillance solution. Security issues and analog hangovers With the existing proprietary solution at the airport locked down to one manufacturer and littered with issues resulting in high maintenance and expansion costs, a new solution was required that would allow the airport to scale it’s surveillance solution in line with future expansion plans. Not only was the existing surveillance solution analog and proprietary, it wasn’t intuitive and was difficult for operators to use. There were several ‘satellite’ security installations scattered in various terminal buildings that weren’t viewable in the centralized control room which meant extra operators were required. The low-resolution analog cameras made it difficult to identify people during incidents, and coupled with the lack of video coverage it gave operators poor situational awareness. Reviewing past events with the existing VMS was difficult as playback wasn’t synchronized, and without bookmarks, it was time-consuming to find important events. The combination of multiple terminal buildings and the centralized analog architecture resulted in bottlenecks and latency issues as all process. Addressing security and scalability concerns The required solution had multiple requirements to ensure that the existing issues were resolved and that the solution could scale with the planned expansion. With expansion planned to facilitate growing passenger numbers, an open IP based solution was specified to replace the existing analog solution to improve situational awareness, provide scalability and integrate with a number of other systems operating in the airport. The architecture needed to limit bottlenecks, reduce latency issues, provide redundancy advantages and be scalable to allow for multiple new terminal buildings to be connected with ease. New HD cameras were specified to improve image quality and coverage with a video wall required in order to view and manage the increase in video streams in the centralized control room. New large capacity NVRs were also specified to cope with the increase in camera streams and an extra NVR for redundancy and failover. Distributed Architecture helped exceed requirements A solution with Distributed Architecture was chosen as it solved multiple issues with the existing solution and facilitated future expansion without the need for a centralized server. Distributed Architecture allows data to be kept close to where it is produced or needed. When camer as, surveillance workstations, NVRs, alarm servers, integration gateways all participate in a Distributed Architecture, data bottlenecks are minimized as all processing doesn’t need to pass through a centralized server. Distributed Architecture provides a truly unlimited and scalable solution that can easily accommodate the largest airports in the world. Distributed Architecture minimized the existing bottlenecks, reduced latency, and provided higher availability and faster access to data. It also allowed all ‘satellite’ security installations to be viewed in the centralized control room enhancing situational awareness. New HD cameras were installed and due to the scalability of Distributed Architecture, future cameras can easily be connected when needed. Furthermore, the scalability of Distributed Architecture enabled the airport to build new terminal buildings and connect with ease to the security solution when ready. Lowering total cost of ownership (TCO) Distributed Architecture enables planned future expansion as it can support thousands of cameras, workstations and NVRs dramatically reducing the total cost of ownership (TCO). The scalability of Distributed Architecture allows the airport to continue with planned expansion and add a single camera/ NVR or a whole new terminal when needed.  

Read More

Cookpad Deploys CrowdStrike to Achieve Enhanced Security

Cookpad Inc. has adopted the CrowdStrike Falcon® platform for comprehensive endpoint protection and to increase overall security posture. Cookpad, the Japan based tech company, offers a global community platform for consumers to share recipe ideas and cooking tips. They found themselves struggling with frequent detection errors from their existing antivirus product. The Cookpad security team sought to find an endpoint protection platform to improve their security posture and ultimately deployed three modules of the CrowdStrike Falcon platform – CrowdStrike Falcon Prevent™ for next-generation antivirus (NGAV), Falcon Insight™ for endpoint protection and response, and CrowdStrike Falcon OverWatch™ to proactively hunt for threats in their environment. The CrowdStrike Falcon platform, powered by AI, continues to set the standard in endpoint protection by unifying next-generation antivirus, IT hygiene, endpoint detection and response (EDR), cyber threat intelligence, and proactive threat hunting for customers around the globe. Through the seamless deployment of CrowdStrike Falcon, Cookpad experienced the following benefits: Substantial reduction in detection errors or false positives, enabling more robust security: The single-agent, cloud-native infrastructure of CrowdStrike Falcon enables a substantial reduction in detection errors without impacting operations for the organization. Detailed event assessments for faster remediation: CrowdStrike Falcon can quickly investigate and identify malicious behavior on endpoints. This allows for rapid triage of system environments and quickly backtracks process sequences and timelines enabling quicker remediation. A comprehensive viewpoint into the IT environment through proactive hunting on networks: Integration of Falcon OverWatch provides an additional layer of oversight and analysis on malicious behaviors. OverWatch proactively hunts, investigates and alerts threat activity within Cookpad’s environment, improving overall security posture. “The CrowdStrike Falcon platform enables visibility into our environment – real-time and historic,” said Masayoshi Mizutani, Security Team Leader of Cookpad, “After implementing CrowdStrike Falcon, we saw huge benefits that enabled us to understand the movement of security events and offered detailed assessments. From a productivity perspective, some of our members work remotely so we’re thinking that traditional perimeter-based defenses won’t be enough. We approve the remote work with trust because CrowdStrike Falcon platform provides not only threat prevention but also remote inspection capability.” “CrowdStrike Falcon has reinvented how organizations stop breaches by delivering a single-agent, cloud-native solution that provides businesses with more effective threat prevention, detection and response to known and unknown threats,” said Tetsuya Kawai, Managing Director of CrowdStrike Japan, “Forward-thinking companies, such as Cookpad, understand the power and scalability of the cloud. With CrowdStrike, they have already experienced the benefits of a faster, smarter, and more agile solution that has allowed them to reduce detection errors, and proactively investigate and rapidly respond to threats, thereby fortifying their security posture.” This latest adoption underscores the advantage of CrowdStrike’s cloud-native technology architecture that enables rapid development and roll out of impactful new modules and capabilities. CrowdStrike has set the new standard in endpoint protection through harnessing the power of the cloud.  

Read More

Shorten Your Checkout Lines to Enhance Customer Experience

Today’s shoppers have less time than ever to get their grocery shopping done, and they expect a fast and easy purchasing experience. Waiting to pay is a huge problem for retailers and shoppers alike. Customers who find themselves in a seemingly endless line may grow intensely frustrated – upto the point that they abandon the store. Long checkout lines are therefore damaging customer relationships.   In fact, a recent study from Forrester Research and Digimarc stated that long lines are one of the main reasons for shopping abandonment. To avoid wasting time, more than half of shoppers would like to spend less money in a store, or even walk away entirely. Shorten the lines with queue detection technology So how to keep waiting times to a minimum and react quickly to growing checkout lines – intelligent queue detection technology is the answer. To tackle this problem, many forward thinking retailers are now using queue detection technology to keep track of lines in real time during the checkout process. Queue detection technology uses cameras to count the number of people in a line to a predetermined threshold of customers. Once the number reaches the threshold, and more customers are continuing to wait, the system alerts store management to open new checkouts. New customers, increased revenues and smarter staffing Given the importance that customers place on a fast checkout process, reducing wait times is a key investment opportunity. Retailers that boost checkout efficiency can not only please their existing customers, but also entice new customers who may have avoided shopping there previously. Customers may also spend more money if checkout is faster. In a study by Oracle, 94% of respondents stated that they buy food and beverages at sporting events – and 58% of these respondents said they would spend even more money if they didn’t have to wait in lines. What’s more – over time, queue detection technology can enable managers to improve the operational efficiency of a store. Armed with new insight into the typical throughput of customers at different times, managers can scale staffing levels up and down accordingly Hikvision: the market leader in queue detection Hikvision’s market-leading queue detection technology is purpose-built to offer cutting-edge flow analysis to retail outlets including supermarkets, exhibition halls, chain stores, and any such situation where waiting to pay is required. Embedded into their high definition cameras, and powered by deep learning algorithms, this easy-to-use technology is highly accurate at counting people, and can even recognize different individuals and their specific dwell time. Store management can set thresholds for the maximum number of people in an area – be it the checkout or elsewhere – as well as for the longest stay duration of a single person. Once a threshold is exceeded, the system will immediately alert managers so they can take appropriate action.  

Read More

Power-over-Ethernet & Campus Security

Power-over-Ethernet (PoE/ PoE++) is a technology that enables devices to receive electrical power over a standard ethernet cable. Ethernet technology has evolved over the last few decades and is pervasive in almost every office, and small and large businesses. It is used to network servers, storages etc., that provides end-users a critical service as far as their business operations are concerned. In parallel, over the last decade or so, many companies are manufacturing devices that use the Internet Protocol as a means of communication. This allows for many disparate devices to communicate with each other using the IP protocol and all of them today use the ethernet cable. This makes sense because the price point of ethernet technology has dramatically dropped over a period of time, which is seen across all technology spectrums such as network switches, NAS storage, fire alarms, access control systems, BIO ID systems, surveillance cameras, video management software, and innumerable other technologies that have come to benefit from the ubiquitous IP protocol and Ethernet L2 routing protocols. One can now imagine all the possibilities of building a single unified secure system with very different devices – all networked together but unified by a single software platform. However, there is a caveat in all of this. Most of the devices are located in different parts of the infrastructure and they all need electrical power to run and function reliably. As all of them use ethernet cable to communicate – including electrical power within the connecting ethernet cable – it eliminates the need for a power supply at each terminating device, and that results in cost savings. Every manufacturer has to ascertain that the devices are PoE compliant which results in half the number of cables being used to network plus has the added advantage of a 100 meter run between the device and the nearest network switch. In summary, PoE/ PoE++ is a simplifying and unifying technology which allows system integrators to build custom solutions as per the customer’s requirements without having to worry about different power supplies with different power ratings for each device. There are several PoE products available in the market which can be easily searched. Once the requirements of the customer are known, one can make a choice of vendor and budgetary limitations to put together an appropriate solution. Following paragraphs illustrate various considerable points as an example for using campus security: Basic campus security requirements and the driving forces behind them 24/ 7 school/ college curriculums necessitate authorities to revisit campus security requirements such as: Increase in on-campus crime rates due to various factors, Different and unique requirements for different departments within the same campus, Managing policies across multiple infrastructures are increasingly complex, Troubleshooting is extremely tedious and time consuming if a unifying system integration plan is not put into place at the very beginning of the project, and Ongoing daily maintenance and upkeep of devices and network infrastructure. Other essential campus considerations Centralized cloud-based management that becomes important when one has to manage several campuses at the same time. Security which becomes critical when all campuses are tied together through the cloud as a single security breach can wormhole itself to all campuses. PoE devices which act as a unifying technology at the base level of the security architecture. Multi-gigabit backbones for future easy expansion as the campus and infrastructure size increases. MAC-level communication encryption between all switches and compute/ storage devices in the network infrastructure. The above diagram shows many components that go into building a security solution. This is more from a hardware perspective and shows a typical layout. A key point to note is the firewall and the WAN connection with outside of the campus. This WAN could connect to other campuses, or to the cloud that connects to other campuses or to both. Special attention needs to be paid to this particular component of the system. Several security techniques are available out in the market to make this point of the network achieve the highest possible security breach block. Challenges and approaches to a viable campus security solution Making a detailed plan as per infrastructure/ campus requirements Making the plan fit into the budgetary limitations. This will be the biggest challenge as some compromises will have to be made. Selection of network, access control and other peripheral device vendors, and finally the software that unifies all these diverse components. A network vendor provides a Network OS responsible for the security and management of various network components. A video management system (VMS) provides the other backbone software around which all other PoE driven devices are connected to. This becomes very critical as the VMS can be looked upon as the other OS which acts as a unifying piece of software. Together the ‘network OS’ and the ‘VMS OS’ constitute the bulk of the software with a communication channel between them. The VMS software must be enterprise class with built in video analytics plus it must have the ability to connect to all the peripheral access devices through an application programming interface (API) and software development kits (SDKs). The VMS software must have the ability to support several types of IP cameras as well as provide an easy and quick path to integration for all other peripheral access devices. The illustration above is to depict the critical role the VMS plays in a security system. It is the key backbone software that talks to all other peripheral access systems software. In the above example we have shown automatic license plate recognition along with under vehicle surveillance system at the key entry points into a campus. The VMS in the above case also integrates an existing visitor management system but now enhances it with video and facial recognition. The campus shown is connected through the cloud to other campuses. The cloud component allows remote management and control, and has access to machine learning and artificial intelligence, and machine learning components of Azure/ WATSON. Any cloud service could be used…

Read More