24 August 2012

AXIS Communications Q6035-E PTZ Deserves a Look, it’s a Powerful Tool


I spent a day this month at AXIS Communications new Headquarters in Chelmsford, Massachusetts; I had not been there since 2007 when I was working with them in deployment of their new IP dome camera at that time.  I got to see their impressive new facility and get an up-date on current and future products.
I see their “P” and “Q” series cameras as very powerful solutions for many commercial applications.  I had recommended their Q6035 & Q6035-E PTZ cameras to an existing client who needed an immediate 2.0mp PTZ for a government application.  In fact they told me today that they are very satisfied with its quality and performance.

Some key features of the Q6035-E are:
  • HDTV 1080p 25/30 fps as well as 
  • HDTV 720p 50/60 fps
  • Day/night and H.264
  • 20x optical zoom
  • Outdoor-ready with Arctic Temperature Control
  • Active Gatekeeper and tour recording
  • High Power over Ethernet

The Q6035-E is designed for the most demanding applications, the outdoor-ready PTZ dome provides HDTV coverage of large areas, great details when zooming in, and high-speed pan/tilt performance. It is ideal for city and perimeter surveillance, as well as at airports and seaports.  The HDTV 1080p complies with the SMPTE 274M standard regarding a 1920x1080 pixel resolution (twice the resolution of HDTV 720p), full frame rate at 25/30 frames per second, HDTV color fidelity and a 16:9 format. AXIS Q6035-E also supports 50/60 frames per second in HDTV 720p, ideal for applications that require the capture of quick movements and smoother video. Due to the HDTV 1080p resolution, the camera’s 20x optical zoom with autofocus provides extremely detailed zoomed-in views that are comparable to a 4CIF-resolution camera with more than twice the optical zoom. AXIS Q6035-E supports day/night functionality for clear video even in low light conditions, and wide dynamic range for better visibility of objects in dark and light areas of a scene.

The AXIS Q6035-E PTZ Dome Network Camera collected the platinum award in the "IP Video Surveillance Cameras" category at the Govies Government Security Awards at GovSec in April 2012.

If you have not looked at Axis in a while, I suggest you look again.  Go to www.axis.com for more information.


21 July 2012

How to Reduce Risk by Designing and Supporting the Best Physical Security Technology Solution

It is clear that a system that aims to improve physical security and reduce risk must cater for today’s challenges and tomorrow’s risks. As a security professional, I often encounter clients with integrated security technology systems that do not measure up to their expectations, or fail to effectively mitigate common risks, or need to be completely replaced at cost due to poor design.

Today’s Security Technology Systems are very technical and installations need to cater for a variety of conditions. Even though it is common practice, organizations should not be solely dependent on the installers of their current systems when contemplating security investments. The following 10 steps towards implementing a cost-effective integrated security system can serve as indicators for you as client when evaluating a new security system or a system upgrade:

1.  Design for Risks
When designing a security system I look to design one that not only meets the customer’sexpectations and requirements, but more importantly, mitigates their risk profile significantly, it is imperative to design to reduce current and future risk. Security systems designed to mitigate or neutralize a particular set of vulnerabilities at a particular point in time, are basically restricted from the outset. A security system designed without conducting a comprehensive physical security risk assessment is doomed to failure once the customer’s risk profile changes - a costly mistake! Therefore, a thorough risk assessment should be done to give the designer a clear indication of the threats and vulnerabilities to be aware of the consequences on the design.

 2. Security System Design as a Project
A security system design must be managed as a project with agreed project deliverables. As such, the project must be initiated, planned and executed according to a formal project plan (including scope of work, project schedule and cost estimation) to manage time, cost and quality effectively. Throughout the project attention must also be given to customer expectation management.  Deliverables of a successful security system design project include:
  • Technical design drawings
  • Technical design specifications
  • Inter-disciplinary coordination
  • Product selection

3. Design for Scalability
Can the design be expanded upon and is it flexible? There is nothing worse than a fixed design system that cannot be extended or adjusted. A scalable security system design should integrate with other systems, be upgradable and comply with the customer’s strategic security plan and current security policy.

 4. Design for Robustness
Robustness refers to the quality of the system’s design and installation workmanship. Poorly installed electrical wiring, fragile network installation, incorrectly placed equipment mountings, poorly shrouded cameras and the like, may cause system failure and/or interruptions for repairs or maintenance. A well-designed security system incorporates robustness as a core consideration to ensure that the installed system copes well with day-to-day handling demands.

 5. Provide for Redundancy
The system design should provide for component failure (redundancy) to ensure that there are other components that can replace it functionally, either internally or through a layered approach.

 6. Manage the Roles and Responsibilities
Role players include the design team, integrators and system product suppliers. The different responsibilities must be clearly defined and understood, for example: Is the installer qualified to install the system? Are the technicians trained? Is there a client owned agreement between client and the installer that is supported by the supplier?   It is imperative to create a process flow where there is an independently constructed technical specification document underwritten by the supplier and integrator.

7. Planned Maintenance
With regards to maintenance, the following questions should be contemplated: Is the system correctly installed to meet manufacturer standards and supplier warranties? Is there a dedicated system maintenance team that is trained to maintain the system? Are there comprehensive maintenance schedules set out in a client owned maintenance agreement that are checked on a regular basis? Is there a technical specification document available that has been agreed to by all parties prior to the commencement of the installation? Does this document accurately reflect what you as the client are paying for? Was there proper testing and demonstrations conducted before the installation? Has there been proper user expectation management in the pre-installation phase? Is the system tested against the current and future requirements and expectations? Can you confirm that that which you paid for is installed?

8. Service and Support
Today’s customers need 24/7/365 access to service and support.  Monitoring systems live from a central command center is just one part of the needs of a security system.  From time to time customers need either in-line or on-site emergency support from their integrator.  Does your integrator offer 4 hour on-site support by a qualified technician at any time of the day or week?  Your service agreement should include this type of response written into the contract.

9. Parts Inventories
Integrated security platforms are complex and integrators must respond to service calls and be available 24x7x365. Contractors must send a fully trained and qualified if applicable Certified Technician and have replacement parts available in the vehicle at the time of arrival to the eligible entities location.  The fully trained and qualified if applicable Certified Technician will be required to perform repairs or diagnosis the problem.  The fully trained and qualified if applicable Certified Technician must have replacement components available including but not limited to boards, power supplies, cameras, hard drives, electrical components and all other parts required to make the equipment work.

10. Training
Integrators must provide significant training to designated customers personnel during the final system testing and start-up phase of the project.  The amount of training required is dependent on the complexity of the equipment purchased or leased by the customer and the ability of the designated personnel to learn from the training and training material.  The integrator and customer shall mutually agree on the duration as well as the location and schedule of the training.  The integrator’s fully trained and qualified if applicable Certified Technician shall conduct and instruct the training.  Training materials: to include but not limited to books, handouts, software, or customized training videos will be provided by the Contractor and will be given to the customer at no additional cost, as agreed upon by the parties.  Additionally the maintenance agreement should also include the option for some regular annual training.  Many customers have regular employee turnover and some ongoing training should be expected.

In conclusion, when comprehensive foresight is applied to plan and manage tomorrow’s risks with today’s technology, clients can indeed reap the benefits of a proper system design with risk planning included, followed by proper implementation and ongoing support.

01 February 2012

Evolving Video Alarm Technology and Remote Guarding

The security industry is making an effort to build a new level of partnership with Law Enforcement in our coverage area for greater community life/safety. New advances in technology have made enhanced Video Alarm Systems affordable and competitive with non-video systems – enhanced video alarms can now be purchased by residential and small business and are not just solutions for the large industry. These new enhanced video alarm systems are available from many manufacturers in many models providing a variety of features. At the most basic level, however, the alarm and a video clip of what caused the alarm is transmitted to a Monitoring Agent who confirms an intruder is present and then notifies a Law Enforcement dispatcher. While response to all alarm systems has been proven to deter crime and reduce losses, creating a policy that provides higher priority response to enhanced video alarms is a “win” for the entire community:

Law Enforcement:
More arrests
Greater officer safety/situational awareness
Crime patterns stopped
Enhanced citizen confidence in law enforcement
Consumer:
Greater security and life safety
Commercial Industry:
Greater confirmation of alarm activations and acceptance of enhanced alarm technology.

The goal of Priority Response is to work with local law enforcement to maximize the benefit of the new generation of enhanced video alarms. We request that law enforcement review dispatch priority levels and implement policy changes to reflect a higher priority response for alarms with video confirming the presence of an intruder than that assigned to standard alarms. Ideally, each Public Safety Answering Point (PSAP) would:
  1. Create a special dispatch code for Enhanced Video Alarms with greater priority than standard alarms such as “Crime in Progress”.
  2. Create an email address that participating Central Stations can email the actual video clips of the intrusion for later review by the dispatcher, if desired.
Vendor-Neutral

There are three major technology solutions for video alarms monitored by all the major central stations in the industry. Video alarm systems are now cost competitive with blind alarm systems and have expanded from commercial applications to the residential market. This means that video alarms systems are a realistic and cost-effective option for consumers of all types.

Multiple vendors have created video alarm systems based on three technology platforms:

Wireless enhanced video alarm systems with integrated sensors/cameras.
o EXAMPLE: www.videofied.com
Hybrid systems that combine traditional alarm systems with external CCTV cameras.
Surveillance cameras with pixel-based detection in the cameras that trigger an alarm event and an email of a video clip.

All three technology platforms have proven effective in delivering a video clip confirming what caused the alarm event that can be reviewed by central station operators.

Wireless enhanced video alarm systems with integrated sensors/cameras

Enhanced video alarms are not surveillance systems, but an improved intrusion alarm system. While some surveillance can provide video alarms, surveillance also provides other functionality that goes beyond the scope of video alarms and may impact privacy concerns in residential applications. Enhanced video alarms are consistent with the concept of a burglar alarm. They can operate through the traditional telephone system, IP-phone system or in most cases the cellular network. In the case of Videofied they operate on their own internal battery power and primarily send their signals through the cellular network. This means they can be installed just about anywhere and are portable. You can use them in your home, in your shed, in the woods, on your boat, at a job site or in your office.

This is an "incremental step" in technology doing exactly what intrusion alarms and central stations have always done “To Detect and Notify”. Enhanced video alarm systems go beyond traditional “Detect and Notify” practices, providing visual confirmation of what caused the alarm.

In contrast to expensive surveillance systems, enhanced video alarms are:
NOT to identify an intruder (this may happen but this is secondary)
NOT 24/7 surveillance video (only the clip of the actual incident is transmitted)
NOT to provide "live video feeds" on demand (this may be available on some surveillance systems but often raises privacy concerns in the residential market).
NOT self-monitored by the consumer. This is not a nanny-cam.
ARE monitored by a qualified UL listed Central Station and reviewed by their operators.
Two-Way audio is now optional as is using a telephone line to talk to the panel in permanent installations.

Hybrid systems that combine traditional alarm systems with external CCTV cameras.
In most cases these systems are the lowest cost installations because they are an addition to an existing alarm system. In many cases there is no recording of the video, this is an option. Many users just work with the 10 second motion clips located on a web-based server provided by the manufactures. They look into look-in on their homes and small businesses and keep an eye on their property – anytime and anywhere there’s internet access. Many end-users use their smart phones to review clips of activity after hours or when their away. Even though there is limited recording in many cases, they all can log in live after the alert/clip is received, to see live activity.

Surveillance cameras with pixel-based detection in the cameras that trigger an alarm event and an email of a video clip.
Situational Awareness or knowing what is happening at the site, along with the expected activities and potential dangers. Early warning capability of providing alerts and notification before serious problems occur. The sooner you can identify potential breaches or risks, the stronger your protection will be. Recording all activity and capturing information to identify and prosecute offenders creates a significant deterrent against crime. Responsiveness of law enforcement with preparation and training to respond rapidly and appropriately when a video confirmed alarm occurs is the key to all remote guarding. In my opinion the best main-stream commercial/public affordable solution are VideoIQ’s intelligent video IP cameras and IP encoders. Their instant detection and notification of suspicious behavior, enabling guards to evaluate the situation and dispatch police immediately to prevent crime and keep city streets safe and secure.

Although this technology is more of an investment than the alarm systems video solutions above, for the money they offer superior quality and their patented, award winning adaptive analytics which are 100% self-calibrating and uniquely distinguish people, vehicles and boats from other objects such as: animals and scene movement, to deliver the highest accuracy in all weather and lighting conditions. Some Municipalities are looking at self-monitoring these systems with their own police dispatchers or auxiliary officers to observe some of their own critical infrastructures.

Typical Central Station Monitored Video Alarm Process
  1. Alarm signal is transmitted to a central station.
    1. In addition to receiving the alarm signal, the operator views a video clip associated with the event.
  2. Operator confirms if an intruder is present.
    1. Based on video clip, operator provides a “confirmed” alarm dispatch for law enforcement to act upon.
  3. The Operator can forward the video clip to the PSAP for review.
    1. Typically this is done via email to a specified email address created by the PSAP.
Priority Response – Greater Efficiency for “Free”
Local law enforcement agencies establish their own priority levels for dispatch to accomplish their mission and maximize their available resources. Because enhanced video alarms provide additional information, greater officer safety and improve the likelihood of arrests, they should be given a higher priority dispatch level than standard alarms. Law Enforcement’s formal support of Priority Response will motivate the Security Industry and Consumers to purchase enhanced video alarm systems. Over time the existing installed base will be upgraded and improve community life safety and Law Enforcement efficiency.

In fact, recently the Insurance Loss Control Association (ILCA) and Property Casualty Insurers Association of America (PCI) recently had the Central Station Alarm Association (CSAA) present at their annual meetings. The topic was rebuilding the insurance/alarm partnership. One proposal involves uniting insurers, law enforcement and security companies together at a county level to develop guidelines useful to underwriters for specific markets. Another proposal involved forming a security/insurer work group to analyze loss data for specific applications, such as construction, and create guidelines for minimum requirements needed to summon police response.

The alarm industry is working hard to reach out to insurance industry associations to educate members and solicit support in an attempt to resurrect a partnership that worked well in the past – security companies installed alarms, police made arrests, and insurers reduced losses. Today, Remote Guarding has crossed the chasm and is now being sold by security systems integrators in the mainstream security market. With systems integrators on the hunt for recurring monthly revenue (RMR) streams, remote video guarding has proven to be a lucrative business and an in-demand value-added service to the end-user community. Whether remote video guarding project is an un-manned town pumping station, high-risk residential community or a car dealership, video surveillance systems and voice over IP (VoIP)/Critical Communications over IP (CCoIP), sometimes with integrated access control systems can provide a seamless monitoring solution that gives better evidence and efficiencies for law enforcement and peace of mind for the end-user, who is in need of onsite security at an affordable price.

14 December 2011

How Physical Security Technologies apply to effective Risk Management in 2012


As a physical security and loss prevention professional I have had the privilege of working with hundreds of clients to reduce their risks. Risks are not just a threat but an opportunity to upgrade physical security solutions and at the same time improve an organizations productivity and profitability. Today’s improvements in technologies, especially software, the physical security industry can offer a more holistic approach that dramatically improves centralized visibility into an organizations security posture and new challenges related to doing more with less (productivity) and increased regulatory requirements. Depending upon the size and scope of the organization the solution may be different but the goal remains the same; to maintain, control and monitor the numerous security-related systems and sensors to a single graphic user interface or GUI that simplifies monitoring and reporting. These systems may include alarm monitoring, access control, locking systems, audio communications, asset tracking, intrusion detection, perimeter protection, video monitoring, video analytics and in some cases building management.

When meeting initially with a new client the most common complaint I hear is: “We have looked at this before and my existing solutions lack the ability to communicate or be integrated.” as the biggest barrier to implementing a more holistic security solution. Well I am here to tell you that with some small upgrades at the “head-end” many of your edge devices and sensors can be immediately integrated in most cases. More importantly from my perspective, by including all departments in the evaluation and research process to improve risk management, the policies, procedures and goals will result in the organizational value of improved overall visibility into the entire security infrastructure.

Here is a generic example of how you might discuss the real needs, goals and risks within your organization before you look to make any changes. By understanding the risks and potential costs associated with those risks, such as: annual loss expectancy, total cost of ownership, you can better develop your return-on-investment.

Let us look at internal investigations as the business area’s to discuss the risks. First create a working group that includes a representative from every department that plays any role in these areas. This might include human resources (HR), corporate security, (CS) information technology (IT), facilities, loss prevention (LP), finance & Insurance, marketing and legal.

Next, brainstorm events and scenarios that could create risk for the company in an internal investigation or disaster. Such events might include information leaks in various departments or a potentially violent customer or employee. Then, rank the risks by likelihood and impact. Absolute precision is not necessary here, although this step may provide the momentum to gather new metrics, both within your business and from the outside world for benchmarking purposes. Now for controls and solutions: List existing controls. Look for redundancy across departments. Brainstorm new ones to address these risks. Rank new controls based on cost, difficulty, and effectiveness—especially noting controls that can reduce likelihood and impact across multiple types of event. With good luck, you might be able to pay for a new control by reducing the redundancy of existing controls. Finally select the appropriate point person responsible for implementing (or championing) each high-priority control. Then establish a way to measure the effect of each new control and a way to communicate that measurement within and outside of your working group. Don't get too hung up on making overly formal. Keep the end in mind: Enable business objectives. Keep it simple (KISS). Make internal investigations more effective and less risky. Now repeat this process with a new team for each of these additional areas: business continuity and disaster recovery, intellectual property protection, and brand protection, employee fraud, loss prevention or asset protection and general liability. Obviously, each of these areas may require a different set of team members although may be the same.

Beyond the specific business value you create in each area—the deliverables you will also lay the foundation for more interdepartmental communication and coordination. Security personnel will have more and better contacts within finance, marketing and other groups. These connections can form the basis for competitive advantage for your organization.

One of the greatest benefits of today’s integrated physical security solutions is the real time actionable intelligence that can dramatically decrease the time to gather together information about security incidents. Then act on that information. For example if an employee is terminated by the organization and HR removes the employee’s authority from the network that information can instantly be upgraded to the organizations access control system, alarm system, etc. This can immediately reduce the opportunity and temptation from a disgruntled employee to cause any further damage to the organization.

After you have defined your risk management goals and vulnerabilities it will be a lot easier to create a budget to meet these goals. Then if you have not already done so, develop a partnership with a security integrator that you can trust. The next step is to test various potential solutions within your organization; I always try to show three of the top solutions based on the client’s vertical market, current legacy systems in place and your goals for today and tomorrow.

The good news is that in many cases with these solutions real benefits have been proven within organizations of all sizes and across a multitude of vertical industries and with very high return-on-investment (ROI) such as three to nine months. Some of the key benefits are: Having the capability to quickly communicate to management the details of an incident, having actionable intelligence about incidents, tools to assist in prevention of future incidents, having real time view of security events, instantly responding to events in real time, reducing incident resolution time, streamlining operations/improving productivity, reducing security costs and delivering a ROI on the organizations physical security environment.

Take a moment to discuss “Risk Management” as a concept with your management team, remember there’s never a dull moment in security. In the next few years, more new challenges will be thrown at business organizations as the cultural landscapes transforms. Will you have the tools in place to meet those challenges?



12 November 2011

Physical Security & Life Safety Solutions with Monitoring from AACI


American Alarm and Communications, Inc., (AACI) designs, installs, integrates, monitors and services security solutions for all types of commercial and institutional facilities as well as fire alarm and life safety systems in commercial and institutional facilities of every size and description. While every customer has different requirements and no two facilities alike, one factor remains constant in every system we integrate: that life safety is absolutely assured through the intelligent application of appropriate technology.  Beyond life safety we offer intrusion detection, access control, and video surveillance systems and networking to cover all your security needs. A fully-integrated security/life safety technology strategy confers many potential benefits, including: improved safety for your people and data; reduced inventory losses; lower insurance rates; reduced manpower requirements; and compliance with industry standards.

AACI Applications – Physical Security
Different organizations face different security threats. In addition to intrusion and unauthorized access, organizations may have special concerns with vandalism, shoplifting, child abduction, data or inventory theft by employees or outsiders, and fraudulent liability claims and workers compensation incidents. Security systems can also be used to monitor internal processes and to guard against environmental hazards such as flood, high temp, freezing, and boiler malfunction.

Intrusion Detection Systems – Physical Security
Intrusion detection often serves as the foundation of a basic security system, but can also be integrated into more comprehensive security regimes. Door and window contacts, glass-break sensors, and motion detectors alert on-site personnel or emergency responders to break-in attempts via local alarms or our own UL central station reporting. Such systems can be hard-wired on dedicated low-voltage wiring, or may share wired or wireless Ethernet with other security and data communications functions. Fixed-station and wireless personal panic alert buttons can be part of the system, and the whole can be integrated with the facility’s access control structure.

Access Control/Visitor Management – Physical Security
Most organizations need to restrict access to specific areas. Visitors and employees may be granted or denied access to data centers, laboratories, or whole floors or buildings depending upon internal policies, and permitted access may change with the time of day, the date (for example, weekends or holidays), or depending upon who else is in the restricted area. Modern access control systems are capable of assigning multiple, visitor management and situation-sensitive levels of access based on the organization’s security needs. AACI provides a full range of access control devices, including keypads, door intercom/buzzer systems, badges or cards with barcode or embedded radio-frequency (RF) technology. Another option is biometric devices that digitally scan the individual’s hand- or thumbprint, face, or iris, and compare the results with data stored in a database.

We also provide the equipment and software to produce and manage photo-ID RF badges, and to control all aspects of access. From a single or multiple locations, permissions can be modified at any time without access to the badge itself, and personnel data and levels of access can be stored in an ODBC-compliant database for efficient, secure sharing with HR and other departments, as needed – for example, to facilitate the use of “smart card” badges as library or meal cards. Access control software also permits facilities management functions such as mustering, roll-calling and occupancy counting, and to set timed non-pass-back restrictions. Access privileges can be automatically adjusted by threat level and overridden manually.

Video Systems & Surveillance – Physical Security
AACI has decades of experience installing and integrating both analog and IP video and closed-circuit television (CCTV) systems for surveillance and access control. Video systems can be used in combination with audio as part of door intercom systems. They can be used to record security events and business processes on a 24/7 basis, and they enable a single individual to maintain surveillance across multiple large properties and building areas. Modern megapixel cameras, available with resolution up to the high-definition range, can monitor especially wide areas compared to older analog devices, making it possible to create full-coverage networks with fewer cameras and better video quality. Low-light cameras and infrared cameras used in combination with IR illumination can record in apparent darkness.

AACI combines video with alarm and access control systems for fully-integrated security solutions. Cameras with motion-detection capabilities can function as sensor devices in intrusion-detection systems, and systems can be programmed so that user-defined security events elsewhere on the network will turn cameras on, increase their frame rate, and control pan, tilt and other telemetry. AACI can even provide video analytics to automate much of the work of surveillance. Software can pick out specific objects of interest in a video image, (such as left-behind bags in transportation terminals), recognize vehicles, identify fire and smoke signatures, count people, and read license plates. These capabilities enable a smaller staff to maintain a higher level of vigilance over larger areas, and to effectively monitor multiple issues simultaneously.

Critical Audio Communications – Physical Security
AACI understands the vital importance of security and communication, whether the solution is an analog intercom or notification system or today’s new critical communications over internet protocol (CCoIP), we can provide the systems and the integration from a single talk thru glass solutions to IP server and server-less systems, audio analytics and integration with other subsystems such as PBXs, IP telephones, IP DECT handsets, PCs and PDAs. AACI can integrate all elements of the security network – intrusion, audio, access control, and video –into a single monitoring, reporting, and storage solution. A wide range of user-definable trigger events can automatically pop up a window on the user’s control monitor showing dynamic floor plan graphics, video, and text identification of the event. The system can be programmed for automatic responses to defined threats and threat levels: for example, to impose access control restrictions or automatic lockdown. Users may also be allowed full manual control over portal access, cameras, and audio announcement or alarms. Browser-based controls permit actions from any location worldwide, and all activities and access events can be logged, stored, and post-analyzed.

Video and other data storage may be on-site in the form of a NVR, network hard drive, or virtually any type of high-volume video or data storage system.   AACI can also provide video alarm verification thru our Central Station, reducing your false alarms. AACI works with your security, IT, facilities and HR people to assess your security objectives. 

The systems we install and integrate will accommodate change and growth as your needs evolve. We provide training, software upgrades, remote programming and video management, central station monitoring, repairs, maintenance, and annual inspection services. Regional offices remain on 24-hour call to respond promptly to every need throughout New England and across America.

AACI Applications – Life Safety
No matter what type of facility you need to protect, AACI has the experience to integrate a cost-effective solution that meets your current and foreseeable needs. We protect small and large commercial, industrial, and institutional facilities; high-rises; campus complexes; and organizations with multiple locations. Different building functions require different approaches to life safety. AACI has engineered and installed systems that meet all functional and regulatory requirements in hospitals and other healthcare facilities; grade schools and universities; government facilities; data centers; and a wide variety of industrial environments.

Detection and Initiation – Life Safety
Detection of a fire signature is the first link in a chain of events, followed by initiation of the alarm system’s response and notification of emergency personnel and building occupants. AACI works with all proven detection technologies to provide optimum protection in every building environment. These include heat sensors, smoke detectors (ionization and photoelectric), laser-based air samplers, and multi-sensor devices. Digital detectors can report temperature, rate of rise, maintenance status and more. Special video cameras with built-in smoke- and flame-detection algorithms can provide unmatched early detection in high-volume spaces such as sports arenas, and can serve double-duty for motion detection and general security monitoring.

Depending upon the facility, AACI may use advanced detection systems to provide very-early warning in critical or sensitive areas such as data centers and clean environments, or false-alarm-resistant devices in industrial settings that are environmentally hostile or highly variable.  For larger-scale enterprise fire and life safety systems, our Advanced Signal division is an authorized Engineered Systems Distributor (ESD) for Notifier by Honeywell. By supporting architects during the design process, electrical contractors during construction, or making the job of facilities managers easier through superior test, inspection and customer service, Advanced Signal has been a partner of choice for business fire alarm and life safety systems for more than 30 years. The control system must lend itself to ease of use while reliably reporting and controlling a variety of functions. Control systems run the gamut from alphanumeric display panels, to PC workstations, to web-based servers.

Control Systems – Life Safety
Today’s systems have impressive capabilities to monitor, evaluate, and rapidly report their own status and that of every device on the network; to record events for documentation and review; and to allow automated control of critical functions such as elevators, emergency power shut-down, smoke control, and fire-suppression systems of all types. Annunciators throughout a facility can give emergency responders varying levels of reporting and control. UL-listed central-station monitoring is a given, but some systems have the added capability to send text messages, detailed email alerts, or real-time video to your smart phone or PDA.
In designing a system for your facility, AACI will identify technology that meets current and future technical needs and regulatory requirements, and the objectives of your IT, safety, and facilities personnel. We can offer simple controls that require essentially no day-to-day management, controls that enable personnel to quickly react to changing circumstances, and controls that give personnel extensive enterprise-wide control over life safety, security, and communications systems from a single desktop or with distributed intelligence across a campus or around the world.

Service - Life Safety 

Life safety is not just a system we sell – it’s a commitment we make to our customers. AACI is a full-service fire protection provider, working with you in an ongoing relationship to ensure the safety of your people and assets. We work with your safety, IT, and facilities people to analyze your needs and objectives, and confer with local authorities to establish compliance. We provide training, software upgrades, remote programming, central station monitoring, repairs, maintenance, and annual inspection/certification services.

Business Fire Alarm Monitoring – Life Safety
Our 24-Hour Security Command Center monitors every element of your fire alarm systems, including sprinklers, with trained staff ready to react to any trouble at your organization.

Fire Alarm Testing and Inspection Services – Life Safety
We also offer comprehensive test and inspection services, as well as remote electronic daily testing to make sure your life/safety fire alarm system is in full working order and providing your business the fire alarm protection that is necessary for proper safety.

Cost Savings with a UL Certified and Accredited Fire Alarm Provider – Life Safety
Our customers also realize insurance cost savings that is available only to companies whose security system and business fire alarm provider are UL certified and accredited, like American Alarm. 

Networking – Life Safety and Physical Security
AACI is an expert at security, life safety and network technologies, from twisted-pair wiring to wireless IP networks. We can provide full LAN or WAN networking of multiple building monitoring systems, including legacy systems installed by others.

Monitoring – Life Safety and Physical Security
Our 24-hour Security Command Center manages a full range of security services only for American Alarm customers since 1971. Our services are designed to help make sure your home or business security system is ready when needed, able to adapt when your needs change, and always supported by a team of licensed and trained professionals who count customer satisfaction as their most important goal. To learn more about how you or your organization can benefit from our solutions, services and experience contact me directly at Jmcdonald@americanalarm.com or call me at 508-962-9927.


22 September 2011

Retail Solutions for Loss Prevention and Operations Management

I had a great time at the New England Organized Retail Crime Symposium & Trade Show yesterday in Worcester, Massachusetts. I especially enjoyed listening to the speakers and the many attendees’s that I had the privilege of speaking with concerning their biggest concerns today.  The common thread for me in these conversations was:
  • Multiple offender crimes
  • Flash Mobs
  • Active Shooter Scenarios
  • Better Internal Fraud Detection Solutions
  • Improve Customer Service
  • Reduce Shrinkage
  • Increase Staff Safety
  • Measure Business Performance
  • Ensure Procedure Compliance
  • Better Remote Internal and External Video Views and Integration Solutions
  • Better Analytics, Including
    • Loitering in high-risk areas
    • Removal of multiple high-priced items
    • In-store, after hours motion detection
    • Electronic Article Surveillance (EAS) alarm activation
    • People counting entering the location
    • Measure traffic flow patterns by aisle, displays or other areas
    • Identify peak busy periods
    • Be alerted to customers waiting at the registers
  • Better Data Mining including:
    • Smart transaction profiling that employ hundreds of built-in, expert business rules to quickly spot patterns of theft and fraud
    • Transaction analysis that also enables searching on credit cards1, coupons, gift and discount cards
    • Easy-to-use query designer enabling development of custom rules to reflect adherence to corporate policies
    • User-definable Dashboard displays the most important data in a Web-based UI
    • Data mining accuracy is enhanced through the statistical weighting of the unique characteristics and selling mix of every store
    • Increased productivity results from conducting investigations with confidence and knowing precisely where the most problematic issues exist
    • Custom report writer delivers interactive reports with essential information, and permits data export to Excel, XML, or other formats
    • Visual intelligence links receipts with digital video to verify suspect POS transactions
Today’s integrated security technologies offer all of these solutions and more.  At American Alarm and Communications, Inc., we offer complete security solutions for customers with high demands for security and efficient solutions.  Prioritized market segments are bank and financial institutions, retail, transport and logistics, state and local governments, health care, defense and industry.  The offering is supported by modern technology within for example, access control, video surveillance, critical audio communications, intrusion prevention, fire alarm systems, integration, service, inspections and monitoring.

I you have any concerns like these, we can have a serious discussion of your goals and plans we can help you design and budget a solution for your organization that can deploy within months and begin to pay for itself immediately.   Please contact me at your convenience to arrange an initial consultation.  I have a paper I quickly wrote to discuss an example of a possible solution, drop me a note for a copy.

Riding the wave of hosted video at ASIS 2011 |

Riding the wave of hosted video at ASIS 2011 |

Physical Security Talking Points and Fraud

When discussing physical security, there are several important talking points to consider. Here are some key points to include: Risk Assessm...