DVTEL Ensures Multi-agency Collaboration during 2015 Boston Marathon

DVTEL, INC., a video surveillance solutions provider, announced that its sophisticated technologies helped drive enhanced cooperation, strong security measures and robust communication between multiple agencies during the 2015 Boston Marathon. DVTEL Latitude Network Video Management System (NVMS) and associated cameras were used to safeguard more than 30,000 runners and nearly one million spectators along key race points and spectator viewing areas along the 26.2-mile course (View news coverage on DVTEL’s involvement).

The enterprise-class Latitude NVMS was chosen to seamlessly merge existing, standalone DVTEL video surveillance systems, typically used by various entities throughout the Metro Boston area for routine monitoring, scene recording and investigations, into a single unified system to achieve new levels of intelligence, and allow race officials and authorized agencies to access comprehensive video footage across the marathon route. Officials monitored activity from multi agency command centers to maximize efforts while ensuring collaboration between law enforcement, event organizers and other aligned stakeholders. DVTEL’s Latitude NVMS provided global situational awareness by linking separate camera networks into a single entity to deliver greater visibility, and provide more insight into safety and security operations.

Since the deadly 2013 Boston Marathon bombing, officials at sports and special events throughout the country have elevated their focus on safety, and therefore, have increased investments in surveillance technologies to monitor suspicious acts, mitigate risk, and effectively manage and respond to incidents. Boston has invested in the DVTEL solutions, which are used to help public safety agencies take a more proactive approach to safety while boosting security for high-profile events, such as the Boston Marathon, other key sporting events, and the popular annual St. Patrick’s Day parade.

The city has continued to invest in intelligent surveillance solutions to further boost its security efforts. This year, it added new DVTEL Quasar HD cameras, including the Quasar 4K Ultra HD, to ensure high-quality video is captured in high-risk or high-traffic areas along the marathon route. The cameras were selected for their ability to be quickly deployed and will be re-purposed for future events, according to the city’s systems integrator and DVTEL partner Lan-Tel Communications.

“Since the bombing at the 2013 Boston Marathon, race officials throughout the country have made security a number one priority,” said Yoav Stern, CEO, DVTEL. “DVTEL is proud to be a part of Boston’s efforts to ensure safety while providing law enforcement with greater visibility to effectively and efficiently respond to incidents. This year’s collaborative efforts were deemed a success, and other race and special event organizers are now looking to Boston as a model for their future security endeavors.”

DVTEL’s role in the security efforts surrounding the Boston Marathon was featured in a number of mainstream publications and radio broadcasts, including NPR, WBUR, WGBH and CRN.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3