classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Fun, games and security
April 2018, Entertainment and Hospitality (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, IT infrastructure

There’s a fine balance between allowing large numbers of people into venues in a smooth and hassle-free way, without compromising security. Hi-Tech Security Solutions discusses three elements in this juggling game with industry specialists.

Eye on the ball

Ettiene Swanepoel, of M.A.S.S., says that while venues may differ for cultural entertainment, casinos and sports events, the common thread is that public spaces catering for large volumes of visitors require a combination of carefully selected physical barriers, manned security and electronic security such as access control, intruder detection and surveillance products.

In the entertainment sector, the biggest challenge in most instances is that the venue often extends over large areas. This requires careful planning of the infrastructure needed for electronic systems. In older, established venues there may have been no allowance made for electronic technology installations and, therefore, finding suitable cable routes, can be a serious challenge. Moreover, Wi-Fi installations could also be challenging because of the structure’s materials of construction such as concrete and metalwork.

Swanepoel suggests that with regard to the electronic security space, one should select a solution that can morph into any application without affecting its efficacy. When proposing a solution during the risk assessment stage, consideration should be given to the network architecture requirements and very often at these venues, a distributed network architecture approach is most effective.

He highlights that there is a certain amount of skill and lots of experience required in selecting the best positioning for surveillance cameras. Because the existing infrastructure, or lack thereof, is often a hindrance, it is sometimes difficult to move cameras, so planning should address effectiveness rather than convenience.

“This alone is a very large challenge for reputable installers and suppliers, since less experienced installers often promote their services on price considerations alone, rather than on the optimal solution for the application. Sadly, venue owners or operators often choose the cheapest solution.

“Casinos, however, are less price sensitive since they deal with large amounts of cash and therefore require high-end security. Upmarket hotels have a similar philosophy, with safety and security of upper LSM guests and their possessions a primary deciding factor,” says Swanepoel.

M.A.S.S. focuses primarily on surveillance solutions, with the deployment of enterprise-level security systems. Because of the size of these operations, a well-designed surveillance system provides the control room personnel and manned security with a view of the entire site either from one central control room or many interlinked control rooms.

“Typically cameras are IP-enabled, with high levels of vandal resistance and a high IP rating to enable their deployment outside. We most commonly use 2 MP cameras, but where larger areas with a wide view of pavilions is required, a 50 MP high-resolution camera is useful. Video analytics is increasing in importance and assists with security, crowd behavioural analysis and management of sites. Typical pre-selected elements could include loitering, panic and disorder, and gate flow.”

The onion approach

A layered approach to security is the ideal solution, according to Impro’s Vikki Vink. The ‘onion’ concept considers what level of security is needed at each inward-moving level of the onion, following a thorough risk assessment.

She points out that obviously the needs for each venue or application would vary. “For instance, at sports events one would not require the use of retinal scanners, but this may be appropriate for casino inner or core layers. At a sports event or music concert, we would typically consider the outer level as the first point of contact with the visitor/sports fan, using some form of ticket that identifies them as having a right to be at the venue.”

The first question venue operators need to answer is: ‘What are my security goals?’ Along with deciding what type of security technology or manpower is needed, they need to identify where people will be accessing the venue, where is the next level of security/access, and which is their highest level of security. For sports events and music concerts this could be VIP boxes or the Golden Circle, while in casinos it would most likely be the cash room or security control centre where one will need advanced equipment to protect assets, such as body scanners/X-ray machines and facial recognition or iris scanners.

Vink says that when budgets are considered, the most cost-effective solutions are generally employed on the outer level, with a simple reader used to scan tickets for visitors to gain entry. A new trend is to send the ticket electronically to the purchaser’s mobile device. When arriving at the venue, the user simply presents this electronic ticket to the reader. This is not only convenient for the user but also allows the venue management to revoke rights should the person be tagged as undesirable. This is very useful in ensuring that ‘evicted’ visitors are not permitted to re-enter the venue once they have been expelled.

From a health and safety perspective, mobile portals which use a handheld freestanding reader allow a device to scan tickets or drivers’ licences with the option of adding on a biometric element. This provides management with the ability to see who is in the facility and allows them to monitor and measure how many people are in the venue to ensure that visitor numbers comply with OHS standards.

Mobile credentials are also coming into their own in the hospitality sector where guests can now register online, arrive at a time that is convenient to them, park their vehicle in a pre-allocated bay and proceed straight to their room where they present their mobile device to the smart lock. This then opens the hotel door and notifies reception that the guest has arrived and has entered their hotel room.

Seamless integration

To ensure that security works seamlessly, it is important to integrate all technology. This means that the security platform must enable instantaneous plug in of every security element, including CCTV surveillance systems and access control. This will allow the smooth deployment of security staff and the locking down of specific areas.

“This is especially relevant for emergency situations, as security personnel can then lock down or open up specific zones quickly and easily. The ability to open up everything on a particular rule set in real time is critical to the safety and security of all. These inclusion and exclusion rules will be based on the initial onion layer setup,” says Vink.

The ability to apply rule sets to systems is especially important when dealing with large numbers of staff. An example is the workflow of business rules within a casino environment. Vink says that in this instance one could institute a rule whereby employees are only allowed to go onto the casino floor after they have taken a breathalyser test and have a certificate of competency linked to their ­credentials. On rollercoaster rides at fairgrounds, for example, the rules set could prevent operators who are not meeting specific safety parameters from operating the ride.

Impro’s Access Portal software allows users to assign security levels and provides built-in security measures that allow one to open up or lock down sites in real time. Customisation allows one to set up specific parameters and rules, for example, one could specify that if a fire alarm is activated, then all doors will open instantly. Another example could be that if there is a threat outside a stadium, the rules ensure that all visitors are kept safely inside the venue, while only security staff will be permitted to exit the venue to address the threat.

On the hardware side, the Access Portal range provides to enterprise-level encryption devices, with a mobile handheld Portal reader proving particularly popular for scanning tickets and drivers’ licences or providing access with a keypad. This is complemented by the full range of Morpho biometric readers and devices which readily integrate with Impro’s software and hardware.

HID’s Mobile Access allows a virtual ­credential to be sent to a mobile phone, which is then presented to a reader to allow access. Time zones can be set up to ensure that people are allowed access only during predetermined time zones and stadium management is provided with an accurate measurement of numbers at any one time.

Raising the bar

Turnstiles, which could be full-height for general admission and half-height for corporate/VIP admission, serve many different functions and can be an ideal way to automatically control admission to events in conjunction with a ticketing system.

When you attend a sports event or visit an amusement park, the turnstile will limit entry to one person at a time, for only those people who present the right credentials (physical or mobile electronic ticket) to the reader. Interestingly, the original purpose of such gates was to allow people to pass from field to field, while keeping their livestock penned in.

Turnstiles can be set for controlled entry and exit as well as manual free rotation. For a simple stadium system, a pushbutton, counter and reset keyswitch can be provided for controlled entry. The counter enables the event manager to audit the number of entries with the number of operations.

“In addition to selling turnstiles outright to a number of stadia worldwide, Turnstar has a number of tournament waist-height turnstiles which are available for short-, medium- and long-term hire. These turnstiles are ideal for temporary events such as festivals, sports events, concerts, elections and conferences and mean that capital outlay is not necessary,” says Turnstar’s Craig Sacks.

All Turnstar turnstiles are compatible with any ticketing system or access control system and portable versions are fitted with a heavy-duty steel base which can be placed on virtually any surface. All that is required to unlock the turnstile for rotation is a dry contact (zero voltage contact closure) from the access system and Turnstar can manufacture any kind of ticket reader mounting in order to seamlessly integrate the ticketing system with the turnstile.

The bottom line is that best practice for event or casino security includes a mix of feet on the ground (manpower), surveillance and access control technology, and physical security such as booms, turnstiles and fences. When these elements work together seamlessly, safety and security of visitors, venue employees and other contractors is enhanced.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Aggregation, automation and augmentation
    April 2018, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Memoori Market Research interviewed Milestone CTO Bjorn Eilertsen, who spoke about future trends in the video surveillance Industry.
  • The IQ of a shrimp
    April 2018, Naxian Systems, This Week's Editor's Pick, Integrated Solutions, IT infrastructure, Security Services & Risk Management
    Amidst all the talk and confusion, Hi-Tech Security Solutions talks to Bernard Senekal to get a better understanding of what artificial intelligence really is.
  • How deep learning benefits the security industry
    April 2018, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Artificial intelligence and deep learning are taking video analytics into a new era of improved recognition and potentially creating a revolution in pre-event alerts.
  • Tiers of remote monitoring
    April 2018, Stallion Electronic Security, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    Hi-Tech Security Solutions spoke to Kevin Monk, MD of the electronic security division of Stallion Security to find out what the options are when retaining a third party as a remote monitoring service provider.
  • Making smart cities see
    April 2018, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
    Cutting-edge technology is required to make a city work and video management software plays an important role in making the establishment of a smart city a success.
  • Verifying your alarm
    April 2018, Videofied SA, Elvey, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    Visual verification has become more important around the world as an efficiency booster and cost saver for users, security companies and integrators.
  • The question of value
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    How do you know your surveillance installation is delivering value? Do your service providers deliver value?
  • Surveillance-friendly storage
    April 2018, Capsule Technologies, Seagate Technology, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Storage solutions for surveillance must be designed for intense sequential writing to the disk and random reading. Your average desktop hard disk won’t do the job.
  • Beyond the hype: tomorrow’s surveillance, today’s reality
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education
    iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.
  • Securing your surveillance
    April 2018, Cyber Security, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    What are the basics your average company can do to secure its surveillance infrastructure from the various threats out there?
  • Feeling vulnerable?
    April 2018, Panasonic South Africa, Axis Communications SA, Cyber Security, CCTV, Surveillance & Remote Monitoring
    One could be forgiven for being sick and tired of hearing about cybersecurity, as it seems to be everywhere, all the time. But the threat is real.
  • Eight things to consider when designing a camera perimeter
    April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    PureTech Systems offers eight practical tips to remember when designing a camera-based perimeter security solution.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.