Museum secures its history

Access & Identity Management Handbook 2015 Access Control & Identity Management, Surveillance, Fire & Safety

The Polin Museum of the History of Polish Jews in Warsaw is now equipped with an integrated and networked safety and security solution from Bosch. The highly customised solution comprises fire detection, evacuation, intrusion detection, access control and video surveillance, which has been designed to very strict security requirements. Should requirements change in future, the entire security system can be easily expanded and adapted.

Worldwide, the Museum of the History of Polish Jews is one of the most prestigious museum facilities. Located in the former heart of Jewish Warsaw, which became the Warsaw Ghetto during World War II, it is an architectonical jewel and a symbol of the new face of Warsaw. The core exhibition presents a thousand years of history of the Polish Jews on about 4000 square metres. Furthermore, the museum offers a rich cultural programme, including temporary exhibitions, films, workshops, concerts, lectures and more.

To protect visitors, employees and exhibits from fire, local Bosch partner Elektroprojekt installed Modular Fire Panels Series 5000 with redundancy and Remote Keypads Series 5000. The panels operate with intelligent point-type and linear beam smoke detectors. This system is closely integrated with the digital Praesideo public address and evacuation system from Bosch. Praesideo allows automatic distribution of four different evacuation messages to specific parts of the building.

In order to guarantee optimal intelligibility in the acoustically difficult environment with high ceilings, Bosch performed a series of room simulations before planning the sound system. Depending on location, five different types of loudspeakers were employed, including, for example, column speakers and in-ceiling speakers.

With regard to intrusion detection, a Modular Alarm Platform 5000 with 700 intrusion detectors secures administrative and office areas but also the storage with the museum’s collection. Additional, non-public areas are also secured by an access control system with AMC Controllers and about 190 card readers.

Video surveillance in the museum consists of Bosch’s Video Management System (BVMS), Video Recording Manager (VRM) and multiple network cameras including camera’s with starlight technology, which are able to deliver high quality images even in extreme low light conditions regardless of object movement. The VRM helps to easily manage large data volumes with maximum reliability as it supports both efficient load balancing and failover recording in case the primary storage array is full or unavailable.

All safety and security systems in the museum are IP-based and tightly integrated through Bosch’s Building Integration System (BIS), allowing for centralised operations and alarm management.

For more information contact Bosch Security Systems - South Africa & Sub-Sahara Africa, +27 (0)11 651 9813, charles.coetzee@za.bosch.com, www.boschsecurity.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.