06 April 2011

Ocularis V2.0 by OnSSI

Ocularis allows you to centrally manage all the components of your physical security information system, including:
  • Access control
  • Fire alarms
  • Video analytics
  • Radiation detection
  • Loss prevention systems
  • Point of sale
  • Elevator systems
  • Building management
  • Heating, Ventilation & Air-Conditioning system
  • Facility automation

Ocularis is designed to work best in multi-site, multi-server environments and it offers a number of key tools that improve how security issues are handled. See this 2.0 video/demo.





Recently OnSSI, announced integration of their highly acclaimed Ocularis software platform with video analytics functionality provided by Mate Intelligent Video, a MangoDSP company.

The Mate intelligent video system can provide alarms in Ocularis related to various modes of detection. This includes directional motion such as a boundary crossing or virtual path crossing detection; a static object like a stopped vehicle or object left behind; or an object removed, which helps to prevent vehicle theft, stock shrinkage or to protect a valuable object. The system can also combine multiple video analytics events using rules dependency to trigger an alarm and to minimize false alarms; for example, at the entrance of an office building, Path Detection followed by Loitering would trigger an alarm only when the loitering is done by a person coming from outside and would filter out the people from the building who go outside. Mate has also developed a number of advanced and proprietary video surveillance technologies such as behavior tracking, people and car counting and tailgating detection.

"Integration of the Mate video analytics product expands the functionality of Ocularis and provides customers an additional choice of video analytics systems to work with Ocularis," said Gadi Piran, President and Chief Technology Officer, OnSSI. "Video analytics work hand-in-hand with Ocularis to control the amount of information an operator has to deal with and to involve operator response only in situations that require his or her attention. Combined with Ocularis, Mate video analytics can prioritize alarms requiring response, improve system functionality, make systems more efficient and enable real-time reaction to incidents."

Complementing Mate’s intelligent video capabilities are features of Ocularis such as instant investigation during live monitoring, open platform support for hundreds of camera models, centralized user rights management and map navigation with active camera previews. Advanced video investigation tools, including the Time Slicer and Kinetic Motion Timeline, are also included in Ocularis, which is scalable for an unlimited number of cameras and servers at multiple sites with single-camera incremental licensing, and is bundled with unlimited installs of Ocularis Client software.

Mate Intelligent Video filters video information to display events of interest and automates video surveillance 24 hours a day, seven days a week. The ability to react in real time boosts proactive surveillance and improves security operations. Other applications include perimeter security, monitoring cash register lines or airport check-in queues and sending an alarm when a large crowd of people gathers.

"Mate intelligent video enhances the benefits of video management software such as Ocularis by monitoring and automating the video content an operator sees," said Daniel Peled, EVP Sales, Mango DSP, Inc. "Ocularis is a user-friendly system that provides operators with helpful tools to manage even large numbers of camera feeds, and Mate video analytics works to make those video systems even more efficient and effective."  GOTO www.ONSSI.com for more information.


New Intelligent Risk Mitigation Security Solutions



Cisco announced a series of safety and security product innovations powered by A Medianet architecture to help cities, enterprises, small businesses and partners transform the way they protect people, property and critical infrastructure. Today's announcement introduces enhancements to several Cisco services designed to help customers transition to IP-based safety and security systems. These include:
  • Updates to the Cisco Physical Access Manager, Cisco's application for managing integrated security operations on an IP network. It integrates hardware such as door readers, locks and biometric devices on campus environments and office buildings, providing a platform for integration with other IT systems.
  • Enhancements to the Cisco IP Interoperability and Collaboration System (IPICS), Cisco's complete IP-based dispatch and incident response solution.
  • A Network Readiness Assessment service for IP Video Surveillance that will help Cisco channel partners to evaluate and plan their customers' network capabilities to support standard and high-definition video surveillance solutions.

The integrated safety and security solution not only offers video surveillance capabilities but also takes advantage of integration with A Medianet network-based services to support end-to-end video quality while automating many aspects of configuration and deployment.

Cisco Physical Access Manager 1.3

Cisco Physical Access Manager now delivers enhanced local survivability for network-based access control by helping to ensure that if a system fails, access identity and operations still function effectively. For example, an improved fault tolerant anti-passback feature works even in the event of a network outage to help ensure that premises maintain a high degree of security under uncertain conditions.

The solution allows plug-and-play A Medianet-enabled cameras to be used as motion-detection sensors. This enables customers to consolidate alarm management procedures, thereby lowering the cost of security operations.

Government and enterprise customers can reduce the fraudulent duplication of access cards and identity credentials through support for new federal identity standards such as FIPS-201 and HSPD-12.
For global customers, the Cisco Physical Access Manager 1.3 desktop client provides the ability to display menus and other text in multiple languages.

Cisco IP Interoperability and Communications System (IPICS)

Cisco IPICS is a complete IP-based dispatch and incidence-response solution enabling rapid, reliable communication using whatever desktop or mobile device is at hand to provide public safety personnel with continuous, real-time communication as well as streaming video.

Cisco demonstrated solutions on IPICS mobile platforms, including Android, with future support planned for the Cisco CiusTM tablet. IPICS now includes expanded operating system support for Windows 7, as well as for iOS 4 devices, including the iPhone 4 and iPad 2.

The latest generation of routers, including the Cisco Integrated Services Router G2 and router media service gateway, are now supported, as well as all types of radios and future mobile and broadband networks, including narrowband and 4G / Long-Term Evolution (LTE).

Cisco also today announced the Cisco IPICS Video Dispatch Starter Kit, a turn-key package that contains all the hardware and software necessary to transform the Cisco Video Surveillance system into a collaboration solution enabling dynamic real-time two-way video sharing between the operations center and mobile users.

IP Video Surveillance Network Readiness Assessment Service

Prior to video deployments, Cisco is helping customers remediate any network design or capacity issues by making training, knowledge and tools available today to Cisco Authorized Technology Provider (ATP) Partners to analyze, inventory and assess customer networks.

The goal in assessing the network is to ensure the quality of experience of the video surveillance deployment to meet the safety, security and loss-prevention needs of the business and organization.

Cisco IP Service Level Agreement Suite - Video Operation

To help customers simulate planned video traffic loads, Cisco also introduced Video Operation as part of its Cisco IP Service Level Agreement suite. This Cisco IOS Software feature for the Cisco Catalyst 3000 Series Switches enables video surveillance, Cisco TelePresence or IPTV traffic to be simulated using profiles prior to full deployment and to troubleshoot video performance in existing networks.

Supporting Quotes

Bill Stuntz, vice president and general manager, Physical Security business unit, Cisco, said: "The combination of new security threats, regulatory compliance mandates, and the need to protect critical assets has driven the demand for a more efficient use of physical security technologies powered by next-generation services. The introduction of new solutions and network assessments will enable our customers to meet changing safety and security needs while improving flexibility and reliability."

Debbie White, manager of Landside Operations, Auckland Airport, said: "Auckland is the largest airport in New Zealand, serving 13 million passengers annually, so safety and security are paramount to our operations. Working with Cisco enabled us to provide the extra level of functionality, flexibility and efficiency required to support changing infrastructure and traveler needs as we continue to grow."

Rocco DelMonaco Jr., vice president for University Safety, Georgetown University, said: "The Cisco physical security solution deployed at Georgetown University has exceeded the requirements and challenges of helping to protect and secure a campus with nearly 15,000 students and thousands of faculty and staff."

André Bourget, chief security officer, canton Vaud, based in Lausanne, Switzerland, said: "Working with Cisco, canton Vaud has evolved its IT and networking infrastructure to provide superior service and protection to all of its constituents, including the police, the department of Justice and open-desk services to citizens. The open, scalable solution helps to enable a high level of integrity, security and efficiency and provides opportunities for expansion in the future to meet the control, access and video protection needs of the canton's 2,000 government buildings."

Keske Toyofuku, chief information officerforFirst Wind, said: "Operating wind farms in remote locations makes ensuring safety and security a challenging problem. To help First Wind efficiently manage these risks, we turned to Cisco to provide a comprehensive and fully integrated system. Prior to installing our Cisco complete video surveillance and physical access control system, video and access control were not fully integrated and difficult to manage. With the deployment of Cisco Video Surveillance Operations Manager as well as Cisco Physical Access Manager for our wind farm facilities, we have both simplified and improved access control and video surveillance."

Jeff Woodward, senior manager, Panduit Global Environmental Health and Safety, said: "By centralizing security operations from our Unified Operations Center, we should achieve an annual estimated saving of $653,000 and a 1.5-year payback period while enabling our security personnel to monitor and control video surveillance cameras and building access controls for all global offices over a WAN."

Panduit collaborated with Cisco, N2N Secure, and IPVision on a connected building design for its new World Headquarters building which combines security and network operations functions in a single Unified Operations Center. The project integrates state-of-the-art security systems, incorporating video surveillance, physical access controls, analytics software, and interoperable communications.

Supporting Resources:

Auckland International Airport Enhances Safety, Communications, Response: http://newsroom.cisco.com/dlls/videos/auckland_020209.html

Joel King's ISC West Panel Discussion: http://www.youtube.com/watch?v=7qkckNkzcQ8







To learn more, visit Cisco Physical Security: www.cisco.com/go/physec

Cisco Video Surveillance Solution for Small Businesses: www.cisco.com/go/SmallBusiness

01 April 2011

KEEP AN EYE ON YOUR HOME OR SMALL BUSINESS FROM ANYWHERE YOU ARE


Now you can install reliable and economical monitoring solution that allows you to monitor video on just about anything you like.  American Alarm’s iSee Video system enables you to view live video feed of your home or business from any web-enabled computer or smart phone.

Use iSee Video to:

  • See who’s at your door in your driveway or around your yard.
  • Monitor for intruders and help solve burglaries.
  • Monitor nannies, babysitters and caregivers.
  • Receive notifications when children get home and view video to see who might be with them.
  • Monitor pet’s behavior.
  • Check in on second homes.
  • Monitor house or pool cleaning services.
  • Monitor second homes or vacation homes.
  • Monitor your small business and employees.
  • Enable friends and relatives to view the video feed on special occasions remotely.
  • And much, much more.

Alerts are sent automatically to your e-mail or phone, video clips will show you what just happened so you can decide if you need to view live or take additional action.  We can also integrate to your security system to minimize false alarms. View openings and closings, temperature changes, deliveries, etc.  Optional recording up to 30 days of continuous video playback of up  to 6 cameras or devices. ISee Video has remote Pan Tilt capabilities.

System Costs:
  • ISee Wi-Fi Video, Starter Kit: $450
  • Monthly Server Charge: $9



26 March 2011

Goals of A Physical Security Consultant


As a Physical Security and Integrated Systems Consultant, I help businesses to better manage their security risks, reduce losses, and provide a safe and secure workplace for your employees.  To implement security strategies that is aligned with your organization's mission and values that support rather than interferes with the operation of your business.  As a resource for state and local governments, corporations and high net worth individuals, I always advise you based on my experience and your goals.  Some of those recent goals are:
  • Find the right balance between security and convenience.
  • Provide security in a way that respects the unique culture of your organization.
  • Make employees, customers, and guests feel safer and more secure.
  • Keep from spending money on security equipment that won’t really solve your problems.
  • Reduce ongoing security operating costs by using doing more with less.
  • Have your security program add value to your organization's bottom line.

I specialize in helping companies and organizations that don't have a security department or security manager and for organizations that do have a security or asset protection department, I provide an objective outside look at the way that security is presently managed, as well as provide services that can inform on new technologies that could supplement and enhance the capabilities of your in-house management team.

In future posts I will discuss some experiences that I have had in providing these services over the years. If you have any questions or to learn more feel free to email me anytime at jmcdonald@AmericanAlarm.com.

24 March 2011

A Burglar Alarm Is An Investment In Your Security


People today agree that the world we now live in is a lot different from that which our parents and grandparents lived in. Statistics today show that a burglary now occurs every 14 seconds. So why wait until after your home has been robbed to get a security system installed? The security systems now available are much more advanced and sophisticated compared to those available a few years back. All the systems today are now designed to help secure your home against any intrusion. Unfortunately as home security systems have advanced, so have the methods that burglars use in order to gain access to a property. Just having chains or padlocks on your property, or even a very basic burglar alarm, is not sufficient to deter a would-be burglar.

However, by investing in a good alarm system, you will not have only peace of mind but also know that you have taken measures to ensure that your property and your family are secure. It is best if you choose a system that will protect both you, your family and home at all times of the day. It should not matter whether you are in it or away on vacation. By installing a good system within your home, you know that you will sleep better at night because any potential intruders will see that you have a system in place and are likely to move on to more vulnerable property than yours. Not only is having a system practical but it can also be extremely cost effective. Many insurance companies will provide those homeowners who have an alarm system installed on their property with a discount on their premiums. 
If you are looking for more information on a burglar alarm, just ask and I provide you with everything you need to know in regards to the various options now available. So don’t be caught without protection. Get a burglar alarm installed today.

22 March 2011

Guy Kawasaki shares some tips from his new book, "Enchantment"



Guy Kawasaki shares some tips from his new book, "Enchantment," on how to get customers excited about a product. His three pillars of enchantment for business include: likability, trustworthiness, and a great cause. He says that right now marketers are focused on engagement, and he wants to change the conversation to enchantment.

20 March 2011

Experience Certainty with a Physical Security Assessment Survey


Physical security is the most fundamental aspect of protection. It is the use of physical controls to protect the premises, buildings, site facilities, people and other assets belonging to your company. In this day and age, you cannot afford not to have a security evaluation performed on your property to protect yourself against intrusion into your company, frivolous lawsuits interruption of normal business operations or damage to your business reputation.
Many of my clients wish to periodically reexamine the way that they provide security at their facilities. The desire to do this may be triggered by a recent security incident, rapid growth of the organization, or a change in management philosophy.  In many cases, there is a desire to reduce costs or to see how well the organization’s present security program compares with that of its peers.

A formal Security Survey/Assessment is an excellent way to evaluate an existing security program. During a Security Survey/Assessment, all aspects of the security program are examined, any weaknesses are identified, and suggestions for improvements are made. In addition, opportunities where costs can be reduced or where security operations can be made more efficient are identified.  My assessments can be very comprehensive or a simple surveillance survey.  The following discusses my more comprehensive version, however I can scale the survey to your needs.

My Survey/Assessment has been used to successfully conduct 100’s assessments at wide variety of different types of corporate, institutional, and governmental facilities over the past thirty years.  This assessment process is constantly evolving, allowing me to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.

The Security Assessment uses a structured, formal analysis process that allows me to develop a deep understanding of your business, operating conditions, corporate culture, and unique security requirements.
While client involvement is always crucial to success, my job as a consultant is to facilitate the assessment every step of the way, keeping the project on track, and making sure that all important elements are examined.


The Security Assessment is custom tailored for each project, but typically includes the following tasks:

Risk Identification
Threat Assessment
Review of Site and Facility Security
Review degree of compliance with recognized CPTED (Crime Prevention Through Environmental Design) principals
Review of Facility Operating Procedures
Review of Regulatory Requirements
Review of Physical Security Systems
Review of Security Policies and Procedures
Review of Security Management
Review of Security Personnel
Evaluation of Present Security Program and Identification of Weaknesses
Development of Recommendations for Security Improvements
Identification of Short-Term and Long-Term Costs
Prioritization of Recommendations and Development of Implementation Plan
Preparation of Written Security Assessment Report


The Security Assessment Process
So, what can you expect when I conduct a Security Assessment at your facility?

The following is a brief outline of the typical assessment process:

  1. Prior to coming to your site, we will request a number of documents for my teams use during the assessment. These typically include plans of the site and buildings, copies of any existing security policies and procedures, samples of various types of forms, company telephone directory, employee handbook, and other similar items. I only want what you already have; if there is something on our request list that is not available, it is not a problem. 
  2. I will work with you to identify the people within your organization that we would like to interview. The goal is to get a good cross-representation of all of the major operating and support departments within your organization. Typically, this would include members of senior management (CEO, CFO, CIO, etc.), department heads, and people who occupy roles which are directly related to security, such as building receptionist’s, security officers, and shipping/receiving personnel. The typical interview session lasts between 30 and 45 minutes. 
  3. When I first arrive on site, I will start by conducting an in-depth interview with the person who presently serves as “security manager” for the facility. This may be an actual security manager, or may be the facilities manager or other person who manages the security function for the organization. This interview session covers a lot of details, and typically takes 2 to 3 hours. After this interview, we ask this person to give us a brief guided tour of the facility. 
  4. I then begin conducting individual interview sessions with each of the employees identified in Step #2 above. Depending on the size of the organization, this process could take one, two, or more days.
  5. At the conclusion of the interviews, I will conduct detailed inspections of certain areas of the facility and site. I may also spend extended periods of time observing certain areas of your facility, such as the building lobby or shipping/receiving loading docks, etc. 
  6. I will return at night with our light meter to take lighting measurements in your parking lots and other areas of the site. I will also take advantage of this opportunity to observe how your facility operates at night, and to get a general feel for the neighborhood during the hours of darkness. 
  7. At the conclusion of the visit to your site, I will meet with you to give you an update on our progress and to discuss the next steps in the process. At this point it may be possible to offer some preliminary findings and recommendations, but in most cases, we will need time to process and analyze the data gathered before I can give you any meaningful guidance. 
  8. I then return to our offices and begin, with my team,  our formal Security Assessment process. During this process, we identify your critical assets, analyze potential threats, review loss history, study crime forecasts for your site, evaluate existing security measures, and identify potential weaknesses and areas for improvements. At the conclusion of this process, we begin to write the Security Assessment Report. It normally takes between two and three weeks from the time we complete our site visit to the time when we complete our draft report. 
  9. While we are preparing the report, we often uncover things that require further investigation and study. In some cases, this may require that we return to the site to conduct additional interviews or to examine certain things more closely. We may also request certain additional documents or other information that is available from within your organization. 
  10. When the draft Security Assessment Report is completed, I will send it to you for review. After you have had an opportunity to digest the document, I will meet with you in person or via teleconference to review the report in detail and respond to any of your questions or comments. 
  11. After I have obtained your input, we will prepare a final Security Assessment Report that incorporates your comments. If desired, I can make a formal presentation of the Security Assessment Report to your senior management team or others.
  12. At the conclusion of the assessment process, I remain available to assist you with implementation of the recommendations contained within the report. This can include identifying vendors and sources of products and services, reviewing proposals, developing security policies and procedures, providing training, and assisting in other ways.

To learn more about my process CLICK HERE or contact me by e-mail at jmcdonald@americanalarm.com or call me directly at 508-453-2731.

Physical Security Talking Points and Fraud

When discussing physical security, there are several important talking points to consider. Here are some key points to include: Risk Assessm...