<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=418049711866397&amp;ev=PageView&amp;noscript=1">

Security Answers Blog

What's Bosch Up To at ISC 2017?

Posted by Matt Golueke

Mar 28, 2017 9:57:38 AM

Visit the Bosch booth #11053 to see integrated security solutions! Intrusion detection, access control, video surveillance and monitoring, and communications technology work together to deliver:

  • Increased facility security
  • Enterprise-wide control of devices
  • Automated audio announcements
  • Verified alarms for priority response

MidChes Team Contacts at ISC:

Discover the benefits, learn about Bosch integration partners, and get details on Bosch's latest products and services:

  • Video analytics at the edge as standard for all IP cameras, IP 4000 family and above
  • New IP cameras across the range, featuring H.265 compression and intelligent streaming for lower bandwidth and storage requirements
  • Video management with access to up to 10,000 sites from a single operator client
  • B and G Series control panels that integrate intrusion, fire, access control and IP video for complete security solutions
  • Installer services and dealer marketing support designed to help you increase profits
  • Video monitoring services for creating new revenue streams
  • New cloud-based analytics for retail applications

And, see our products in partner booths throughout the show floor, including:

  • Live demo of the integration of Bosch intrusion, video, access control and fire detection technology with the XProtect VMS: Milestone booth #18053
  • A cyber secure IP video solution from Bosch, Genetec and SecureXperts: Genetec booth #28055

 

Education Sessions

 

 
 

Free Breakfast Sessions:


Video is More Than Just an Image

The future of video security is to use the hidden potential of captured data and utilize your security system 100%, allowing data to do far more for your business than security alone.

 

 


Wednesday, April 5, 9 - 10 am

Venetian Ballroom G

Register

 

 

 
 

Win Big with Bosch Integrated
Security Solutions


Gain valuable product insights, learn about new installer service offerings, and understand how to offer fully integrated solutions to a wide range of vertical markets.

 

Thursday, April 6, 9 - 10 am

Venetian Ballroom G 

 

Register

 

 

 




Free Lunch Session:


Win Big with Bosch Integrated
Security Solutions

Presentation will be the same as the breakfast session on Thursday morning. Choose either the breakfast or lunch session.

 

 


Wednesday, April 5, 12 - 1 pm

Venetian Ballroom G 

 

Register

 

 

 




SIA Session:


Data Security and Video Systems
Speaker: David Brent, Technical Trainer

Learn the fundamental considerations that an organization needs to understand before placing an IP camera on their network.

 

 


Wednesday, April 5, 10 - 11 am

Sands 307 level 1 

 

Details

 

 

 




 

Free Expo Hall Registration


Register free for the ISC West exhibit hall to test out our new technology solutions and discuss your needs with our product experts.

 

 

Register

 

 

Read More

Topics: Manufacturing Excellence

When an Elderly Patient Resident Wanders Away

Posted by Shaun Meehan

Mar 27, 2017 12:38:24 PM

Shaun Meehan recently visited a facility where an elderly resident had wandered away.

Fortunately the resident was located. 

But what solution is available to help track the location of patients, residents, staff members, officers, and valuable assets?

Shaun lets us know in this short video what one solution offers.

 

Pinpoint location in real time of your residents, students, staff, security officers, and/or assets is often necessary for safety and security.


How would you like to know not only the "what" (hold-up/duress/man-down/patient tracking/asset movement), but also the "where" (accurate location marking on a map of your facility) of alarm events involving mobile persons or property?

A unique, patented, and proven solution for alerting security personnel to not only the event that is taking place but also exactly where that event is occurring so help can be dispatched immediately to that specific location.

The aging population of baby boomers is causing a dramatic increase in elder care and assisted living facilities. These facilities can benefit greatly from this technology and it deserves attention. This system is unique and provides you with a great competitive advantage. 

What is Security Escort?

Security Escort is a wireless help-call system that allows you to locate and track people or property throughout the system’s area. Whether you need to provide personal security or manage assets such as computers, equipment or artwork, Security Escort by Bosch Security Systems is the reliable total solution you’ve been looking for!

Who is Security Escort for?

  • Personal protection on campuses
  • Mandown and guard tour features for correctional facilities
  • Asset tracking in museums and financial institutions
  • Patient/resident monitoring in hospitals, assisted living facilities and adult communities
  • Monitoring cash runners at sports and entertainment venues
  • Public safety in Courthouses

An array of transmitters along with numerous system options and ease of use make Security Escort the ideal resource for virtually any user

How does Security Escort work?

This system responds to signals that are initiated either automatically or manually by a transmitter. The signal is relayed through the system to the main computer and up to eight additional workstations. Signals are then actively tracked to provide up-to-the-minute information for alarm
response management. With Security Escort, you get all the tools you need for individualized security and instantaneous alarm notification, plus automatic location updates. It easily integrates into pre-existing CCTV and paging systems. The pager feature gives automatic notification of alarm
signals to authorized personnel. Provide peace of mind by supplying your facility with timely, effective response to any situation.

How do I use Security Escort?

Your Security Escort System is easily controlled through user-friendly software that truly makes Security Escort the superior choice for a complete security solution. The system is maintained through the Central Console, which consists of one or two computers with up to eight workstations. The Windows®-based software is quite intuitive and requires very little training. System operators use basic single-clicks and pull-down menus to access system functions and features. The ease of
operation greatly reduces the opportunity for user error, adding to the reliability of the Security Escort system for any application.

The Details

Case Studies

Case studies that show how it is being used and by whom. Ok, we have a couple of those too. Security Escort is very popular in the Healthcare sector and has been proven in installations for over 10 years.

Our team can show you how it works, how it can make your facility more secure, allow you to take advantage of drastically reduced response times to events, and know exactly where people or assets are located in real time.

We can provide you with system design assistance and lists of certified installers that can provide you with quotes. Contact us here.

Read More

Topics: Your Challenge, Our Solution

Site Survey: Video Surveillance UPDATED

Posted by Matt Golueke

Mar 21, 2017 11:12:42 AM

An in-depth video surveillance site survey is necessary in order to properly evaluate the solutions required to capture evidence of theft, injury, or risk.

We created this updated, ten page document which provides you with over 60 critical questions to ask and considerations to make before deciding on a video surveillance system purchase.

This easy-to-use site survey tool will get you started down the path to an effective video surveillance solution. The site survey will provide an opportunity for all stakeholders to set their expectations and will narrow down the best solution for your application. 

This is a perfect resource for security professionals of all types: system owners, security managers, system design professionals, and engineers alike. Hospitals, corporate campuses, critical infrastructure, industrial complexes, K-12 districts, higher education campuses, and commercial establishments all have a variety of unique applications. Be sure not to miss any details with the help of this guide and our local resources and support.

Click here to access to the Site Survey: Video Surveillance

 

Here is a preview: 

.

.

.

Read More

Topics: MidChes Value Add

UPDATED: Security Solutions Guide Spring/Summer 2017

Posted by Matt Golueke

Mar 19, 2017 9:00:00 PM

DOWNLOAD YOUR UPDATED COPY NOW!

Our Security Solutions Quick Guide has been a helpful resource to thousands of security professionals.

The Spring/Summer '17 version is now available for immediate download

  • New Formatting - use Adobe Acrobat and browse using easy to use Bookmark tabs
  • Updated IP camera selection guide
  • Updated B and G Series intrusion alarm selection guide
  • Updated motion detector selection guide
  • Updated network switch selection guide

Click here to access the download page

Read More

Topics: MidChes Value Add

Parking Surveillance

Posted by Matt Golueke

Mar 16, 2017 9:00:00 AM

Capturing meaningful video surveillance in a parking lot situation can be a challenge...especially without a demonstration ahead of time.

First, and most important, is setting system performance expectations for all stakeholders.

  • What level of detail will be captured and at what distance from the camera(s)?
  • What size image is to be captured as evidence? License plate vs. human face vs vehicle model?
  • What type of activity is to be observed in the area?
  • How fast will targets be moving through the scene?
  • Will entrances and exits be captured differently than parking areas or travel lanes? (more on license plate capture details here)
  • What is the lighting in the area at night?
  • If cameras are being mounted to light poles, what must be considered as far as power requirements and data transmission? (more on this situation here)
  • What is the difference in the needs of the officers on duty watching the parking area versus the needs of investigators if an unauthorized behavior occurs and needs to be investigated?

If you're not familiar with the acronym, DORI, this is a common application where it comes into play. DORI is a standard that helps specifiers, end users, and security installers determine the perfect camera resolution, lensing, and lighting combination required to capture critical surveillance footage. Learn about DORI here.

Next, a Proof of Concept demonstration is in order. This is where the expectations are really put to the test. 

So, Steve Pennington hit the road to help a security team explore the best option for their application.

Steve and the entire MidChes team takes this part of the design process to the limit. Our goal is to show various imaging options in order to allow the end user and stakeholders to see how the different technologies perform in relation to their DORI performance requirements in your environment.

This means that we don't set up the cameras on your desk and ask you to "imagine" how this is going to work. We take the gear to your roof, out to your fence, or inside your hallways to see first-hand how the system is going to perform.

For example, a 1080p camera may work fine at short range, however a 5 megapixel camera may actually be required to capture enough detail at long range. Also, will a pan-tilt-zoom camera be appropriate for the application versus a fixed camera? Many factors go into this equipment selection. 

In the demonstration image below, you can see both fixed and pan-tilt-zoom cameras as well as a panoramic camera. 

Aside from proper imaging requirements, this part of the decision making journey often uncovers the need to add or remove cameras from the plan based on performance. Adding cameras can prevent missing important information when it counts. Removing cameras can mean saving money.

All of the cameras on the roof, in this example, are connected to a local network switch which is networked temporarily to another network switch at ground level. Here, as shown below, is where the cameras can safely be observed by security staff and additional stakeholders.

The quick demonstration deployment and thorough evaluation of the technologies available help security staff feel confident that they will be deploying exactly what's needed to meet their expectations. IT staff can participate in the demonstration to better understand what bit rates and storage requirements to expect. Human Resources and other administrative staff can see first-hand what is reasonable to expect from the system if they need to ask security for footage of a situation.

 

Learn more about Proof of Concept demonstrations

 

Learn more about Try Before You Buy programs

 

Contact our team to schedule a demonstration

Read More

Topics: MidChes Value Add, Proof of Concept, Your Challenge, Our Solution

Securing Valuable Displays

Posted by Matt Golueke

Mar 15, 2017 9:00:00 AM

Whether a luxury automobile dealership, a jewelry retailer, or a fine art museum, there are many ways to deter theft and limit damage to valuable displays.

This week, a visit to a high-profile museum raised a few questions and some interesting observations. While walking around the museum, you can't help but notice the various deterrents that are in place that are visible and obvious. These are used to stop people from touching items. Basically, keeping the honest people honest by reminding them where to keep their hands and feet while enjoying the displays.

We saw a wide range of conspicuous tactics:

  • words printed on display stands

  • lines on the floor
  • ankle-height visual cues

  

  • glass enclosures
  • door control
  • traffic control
  • security guards

But not everything is as obvious. These electronic measures help reduce the risk of a higher impact situation such as damage or theft.

Less obvious security measures included:

  • dozens of cameras
  • curtain detection
  • voice communication

And then there are the measures in place that you may never see or think about. These devices and systems are intentionally out of sight. For honest visitors, these measures, if in plain view, could be a significant distraction. For those intending harm, hidden, high-tech security measures make it much harder to carry out a crime. 

Potentially invisible measures for the imagination:

  • security command center
  • hidden cameras
  • contact sensors
  • seismic sensors
  • video analytics
  • intrusion detection

While noticing all of these systems during our visit, a few questions came to mind:

  • Are these systems working in unison?
  • Are electronic detection systems bringing attention to security staff in a pro-active manner or are the guards just waiting for an obvious problem?
  • At what point is a police force notified?
  • Are "smart cameras" replacing legacy analog cameras?
  • Aside from museums, what industries benefit from similar security tactics?

Here are a few videos related to protecting display items.

In the first video, we see how a Proof of Concept demonstration is tailored to the exact needs of an end user.

The second video shows how video analytics enbedded in smart cameras can provide alerts to security staff during a behavior violation or afterwards during the investigation process.

    

Learn more about this demonstration here           Learn more about video analytics here

 

 


Contact our team to discuss your security plan 

 

Read More

Topics: Your Challenge, Our Solution

Staff, Officers, & Assets: Security Escort Monitoring

Posted by Mark Van Valkenburg

Mar 14, 2017 9:11:00 AM

Pinpoint location in real time of your staff, security officers, and/or assets is often necessary for safety and security.

How would you like to know not only the "what" (hold-up/duress/man-down/patient tracking/asset movement), but also the "where" (accurate location marking on a map of your facility) of alarm events involving mobile persons or property?

A unique, patented, and proven solution for alerting security personnel to not only the event that is taking place but also exactly where that event is occurring so help can be dispatched immediately to that specific location.

The aging population of baby boomers is causing a dramatic increase in elder care and assisted living facilities. These facilities can benefit greatly from this technology and it deserves attention. This system is unique and provides you with a great competitive advantage. 

What is Security Escort?

Security Escort is a wireless help-call system that allows you to locate and track people or property throughout the system’s area. Whether you need to provide personal security or manage assets such as computers, equipment or artwork, Security Escort by Bosch Security Systems is the reliable total solution you’ve been looking for!

Who is Security Escort for?

  • Personal protection on campuses
  • Mandown and guard tour features for correctional facilities
  • Asset tracking in museums and financial institutions
  • Patient/resident monitoring in hospitals, assisted living facilities and adult communities
  • Monitoring cash runners at sports and entertainment venues
  • Public safety in Courthouses

An array of transmitters along with numerous system options and ease of use make Security Escort the ideal resource for virtually any user

How does Security Escort work?

This system responds to signals that are initiated either automatically or manually by a transmitter. The signal is relayed through the system to the main computer and up to eight additional workstations. Signals are then actively tracked to provide up-to-the-minute information for alarm
response management. With Security Escort, you get all the tools you need for individualized security and instantaneous alarm notification, plus automatic location updates. It easily integrates into pre-existing CCTV and paging systems. The pager feature gives automatic notification of alarm
signals to authorized personnel. Provide peace of mind by supplying your facility with timely, effective response to any situation.

How do I use Security Escort?

Your Security Escort System is easily controlled through user-friendly software that truly makes Security Escort the superior choice for a complete security solution. The system is maintained through the Central Console, which consists of one or two computers with up to eight workstations. The Windows®-based software is quite intuitive and requires very little training. System operators use basic single-clicks and pull-down menus to access system functions and features. The ease of
operation greatly reduces the opportunity for user error, adding to the reliability of the Security Escort system for any application.

The Details

Case Studies

Case studies that show how it is being used and by whom. Ok, we have a couple of those too. Security Escort is very popular in the Healthcare sector and has been proven in installations for over 10 years.

Our team can show you how it works, how it can make your facility more secure, allow you to take advantage of drastically reduced response times to events, and know exactly where people or assets are located in real time.

We can provide you with system design assistance and lists of certified installers that can provide you with quotes. Contact us here.

Read More

Topics: Your Challenge, Our Solution

Data Security and Video Systems Event Announced for ISC '17

Posted by Matt Golueke

Mar 13, 2017 8:44:00 AM

SIA Session: Data Security and Video Systems

April 05, 2017, 10:00 AM - 11:00 AM  @  Sands 307 Level 1

As of 2015, nearly 300 million IP cameras have been installed around the world. Many of these cameras have been installed with default user names and passwords and can be accessed from anywhere in the world. For years, the question has been: How secure is the video that a system produces? But, that question is changing. Now the question is: Can my security system be used against me? Most video surveillance cameras are manufactured with an open operating system, or basic kernel, that gives no real consideration to data or cyber security. What are the current fundamental considerations that an organization needs to take into consideration before placing an IP camera on their network?

Learning Outcomes

  • Recognize hash and encryption fundamentals for video systems.
  • Identify how an IP camera can be exploited based on current technology standards.
  • Interpret lhe fundamentals of PKI.

Presenter

Network Video and Cyber Security Training, Bosch Security Systems, Inc.

David Brent is a Technical Trainer at Bosch Security Systems, Inc. David has worked in the security industry for 17 years and has over 21 years

 

_______________________________________________________________________________

Bosch Breakfast Session Announced: Going Beyond Pixel Count

Join Bosch for breakfast on Wednesday, April 5 to learn about the future of video security: Using the hidden potential of captured data for 100% utilization of your security system. This allows video data to do far more for your business than security alone.

Time & Location:
     Wednesday April 5, 9-10 am
     Venetian Ballroom G

_______________________________________________________________________________

Bosch Breakfast Session: Integrated Security @ ISC West '17

Join Bosch for lunch on Wednesday April 5, or breakfast on Thursday April 6, to gain valuable product insights, learn about new installer service offerings, and understand how to offer fully integrated solutions to a wide range of vertical markets. Plus, you’ll get to try your luck with games for a chance to win fabulous prizes. 

  • Enjoy breakfast or lunch while networking with Bosch product managers and executives
  • Learn how dealer marketing support can grow your security business
  • Try your luck with games for a chance to win fabulous prizes

Choose either breakfast or lunch to best fit your schedule. Presentation content is identical for both sessions. Bosch will send a confirmation email and meeting requests to add to your calendar. 

Lunch

  • Wednesday, April 5 - 12pm- 1pm

Breakfast

  • Thursday, April 6 - 9am-10am

Can't make the event?  Learn about Bosch Integrated Solutions here

_______________________________________________________________________________

Security Door Controls Event at Top Golf


Security Door Controls
(SDC) is hosting a Top Golf night to break up some of the hard work on the show floor and in the various education and meeting rooms.

Can't make the event? Stop by SDC at Booth #21109

April 6th at 7pm (Thursday)

 _______________________________________________________________________________

 

Read More

Topics: MidChes Value Add

Video is More Than Just an Image Breakfast Session @ ISC West '17

Posted by Matt Golueke

Mar 12, 2017 9:44:00 PM

Bosch Breakfast Session Announced: Going Beyond Pixel Count

Join Bosch for breakfast on Wednesday, April 5 to learn about the future of video security: Using the hidden potential of captured data for 100% utilization of your security system. This allows video data to do far more for your business than security alone.

Time & Location:
     Wednesday April 5, 9-10 am
     Venetian Ballroom G

_______________________________________________________________________________

Bosch Breakfast Session: Integrated Security @ ISC West '17

Join Bosch for lunch on Wednesday April 5, or breakfast on Thursday April 6, to gain valuable product insights, learn about new installer service offerings, and understand how to offer fully integrated solutions to a wide range of vertical markets. Plus, you’ll get to try your luck with games for a chance to win fabulous prizes. 

  • Enjoy breakfast or lunch while networking with Bosch product managers and executives
  • Learn how dealer marketing support can grow your security business
  • Try your luck with games for a chance to win fabulous prizes

Choose either breakfast or lunch to best fit your schedule. Presentation content is identical for both sessions. Bosch will send a confirmation email and meeting requests to add to your calendar. 

Lunch

  • Wednesday, April 5 - 12pm- 1pm

Breakfast

  • Thursday, April 6 - 9am-10am

Can't make the event?  Learn about Bosch Integrated Solutions here

_______________________________________________________________________________

Security Door Controls Event at Top Golf


Security Door Controls
(SDC) is hosting a Top Golf night to break up some of the hard work on the show floor and in the various education and meeting rooms.

Can't make the event? Stop by SDC at Booth #21109

April 6th at 7pm (Thursday)

 _______________________________________________________________________________

 

Read More

Topics: MidChes Value Add

DST and Related Trivia

Posted by Rick Buehler

Mar 9, 2017 8:36:00 AM


Preparation for Daylight Saving Time

A friendly reminder that it's time to change the clocks, which means a little work for many in the security business leading up to that date. 

On Suday morning, March 12 at 2am, clocks will spring forward and could cause a variety of issues with video recordings across the industry. The type of problem - whether it's dual recordings, no recordings, or the inability to retrieve live or playback video from different viewing platforms - will vary depending on the system manufacturer. In some cases, if time issues are not corrected, the admissibility of video for evidentiary purposes can be affected.

So, before March 12, we recommend you check the following settings for each of these recording platforms:

  • DVRs - Ensure the DVR is set to change to Daylight Saving Time in its DST settings and that changes will occur on the correct date and time. Check with the manufacturer to determine if any bug fixes should be installed prior to the change. 
  • Intelligent Edge Devices - Check that they are configured to communicate with a valid time server and that their internal DST table is properly set.
  • Older Enterprise Systems - Ensure all devices - including Video Recording Managers, Archivers, NVRs, cameras, encoders, decoders and matrix systems - are all pointed to the same valid system time server. And, don't forget your viewing stations! If they are off by an hour, it could affect live and playback video, even if the rest of the system is correct. Note: For newer systems using Bosch Video Management System 5.5 or higher, IP cameras, Video Recording Managers and decoders are all automatically synced to the VMS' central server time.

Connect with our team for expert security advice

 

Read More

Topics: Installation Tips

Subscribe to Email Updates