Cooking up a Bowl of Security

Cooking Up a Bowl of Security

When preparing to open Galileo III, a white-tablecloth Italian restaurant in Washington, D.C., within walking distance of the White House and the National Theater, Chef Roberto Donna let his imagination take hold, not only in the dishes he wanted to prepare for Washington’s movers and shakers, but also in how he could maximize the security surveillance system he knew he would need to protect his assets and help manage his business.

Donna is an award-winning chef, having been twice named Chef of the Year by the Restaurant Association of Metropolitan Washington and receiving the James Beard Award as Best Chef/Mid-Atlantic Region in 1996. He also competed and won in the Iron Chef TV series and has made numerous appearances on other cooking and news shows.

Working with ICI Systems, a technology integrator and IT services provider in the nation’s capital, Donna and ICI consultant Nabih Bedewi deployed a solution that covered the three key areas in Donna’s vision: security, table management and cooking demonstrations.

“When he was talking about plans for the restaurant and was bringing up these ideas, we said we could do all of this in Milestone,” said Bedewi, adding that he hadn’t seen a situation before where a client wanted such diverse options within a system. ICI has been working with Milestone Systems since 2008.

The backbone of the solution is Milestone XProtect Professional—surveillance software used for advanced video management, flexible scheduling, fast searching and video analysis—and XProtect Smart Client, which is used for remote access.

“In order to do all the things Roberto wanted, you usually need different platforms,” Bedewi said. “But using Milestone, we are able to provide a single platform for all forms of camera management.”

Within and on the restaurant property there are 25 PoE IP network cameras: Panasonic WV-NS202A PTZ iPro and the Panasonic BB-HCM715 indoor PTZ. Five cameras are used for traditional security, focused on the front and back entrances, the wine room and the offices. An additional three are for use within the kitchen; the rest are spread throughout the 80-seat restaurant and the two private rooms that serve an additional 45 patrons.

With a wine inventory estimated at $300,000, Donna wanted a solution that would ensure the safety of this valuable asset. Through Milestone, a camera in the room tracks and records based on motion detection. The home position is the door, so when someone opens the door and enters the room, the system begins to track the person and records the entire time he or she is in the room, then automatically cuts off 20 seconds after the motion stops. On the other five doors being monitored, contact sensors are tied into Milestone.

More than Just Security

While the system’s security functions are a necessary part of doing business, both Donna and Bedewi were more excited about the non-traditional opportunities.

“Fine cuisine is all about timing and food preparation,” Donna said.

By having cameras in the dining room that can be viewed via a flat screen monitor within the kitchen, featuring up to 16 views at one time, the chef is better able to time when to begin the next course so customers feel neither rushed
nor neglected.

The cameras are not hidden from view, said Donna, so most customers are aware of their presence. But there is no audio associated with the system, nor is the video recorded within the dining room when it is occupied. The cameras are aimed at the tables, not the people themselves.

Via a touch-screen monitor in the kitchen, the chef can call up an individual table on the screen and make decisions on timing, service and meal preparation. Just tapping an image on the monitor brings it to full screen for the kitchen staff to view, Bedewi said.

The table management system uses the Milestone Smart Client Live View to monitor the tables. There is no recording or scheduling with this function, although Milestone is configured to use scheduling and motion detection for all cameras during non-service hours (midnight to 10 a.m.). Even the table management cameras are recording for surveillance purposes during the off hours.

Donna, who doesn’t cook at the restaurant every day, said he also uses the system on his laptop and office computer to monitor all the video from the security surveillance, dining room and kitchen. From home, he is able to view activity within the kitchen and check on deliveries and when the staff arrive. With 22x optical zoom, Donna is able to observe cutting techniques and other fine details. From a practical standpoint, Donna said he’s used the system remotely to look for keys he thought he had left on his desk. And yes, they were there.

A Class Act

In addition to monitoring dining room activity, Donna is eager to deploy the kitchen cameras for his cooking classes and special meals. He has been doing classes for about 11 years, he said, and in February 2011 he was planning to start again at his new restaurant.

Three kitchen cameras will provide live feeds as Donna prepares the eightto 10-course meals in the Laboratorio, which is open on certain evenings for these special tasting meals. They will provide access codes in advance to people at home who want to view the meal preparation so they can then log in to
see Donna at work.

“It’s a great tool to use,” he said.

The video from the cooking classes will be recorded and archived, Bedewi said. No DVRs are used, just a highend PC for the Milestone server.

Donna conceded his busy schedule has kept him from exploring all the options that the Milestone platform can provide.

“I’m not a computer scientist,” he said, “but the people from ICI explained everything well, provided training and were responsive to my needs.”

Other chefs visiting Donna in Washington have already checked out his system and have been impressed by what it can achieve. “I recommend it to all my friends,” Donna said.

 

This article originally appeared in the July 2011 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.