Editor’s picks

Bosch Startup SAST Addresses Need For Evolved Solutions In Security Industry
Bosch Startup SAST Addresses Need For Evolved Solutions In Security Industry

Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications,...

What Are The Challenges Of Body-worn Cameras For The Security Industry?
What Are The Challenges Of Body-worn Cameras For The Security Industry?

Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?

Five Security Essentials To Protect Your Business From Crime
Five Security Essentials To Protect Your Business From Crime

Crime is preventable and safeguarding your businesses through the use of technology is essential. Whether you want to avoid burglaries or common vandalism, you need to comply with the General Data Protection Regulations to protect your brand’s identity. Security should be one of your main focuses and with the help of 2020 Vision, providers of access control systems, we look at some of the most efficient items that you need in place to protect your property. 1) Deploy Video Surveillance&n...

Steps To Develop An Integrated Retail Security Strategy
Steps To Develop An Integrated Retail Security Strategy

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that ca...

Round table discussions

What Is The Value Of Remotely Monitoring A System's Health And Operation?
What Is The Value Of Remotely Monitoring A System's Health And Operation?

When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system’s health is much easier, and a variety of systems can be deployed to ensure the integrity of a system’s operation. We asked this week’s Expert Panel Roundtable: How can remote monitoring of a security system’s health and operation impact integrators and end users?

What Is The Changing Role Of Training In The Security Industry?
What Is The Changing Role Of Training In The Security Industry?

Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?

What Are The Obstacles To Adoption Of Mobile Credentials For Access Control?
What Are The Obstacles To Adoption Of Mobile Credentials For Access Control?

Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?

Case studies

ASUCQ Chooses SMARTair For Real-Time Access Control And Virtual Keys On A Smartphone
ASUCQ Chooses SMARTair For Real-Time Access Control And Virtual Keys On A Smartphone

An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other university assets. They sought a technology-based solution to reduce security risks across the campus, and specifically an access control system able to monitor multiple spaces and monitor all access points in real time. System software and hardware should make it fast and intuitive to generate or modify access rights for any campus user. A single solution needed to work across both common university facilities and separate areas with student accommodation. Monitoring Campus In Real Time With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when ASUCQ turned to SMARTair to protect its investment and site users. So far, around 600 SMARTair battery-powered online escutcheons have been installed across campus. High traffic flows through many campus doors required robust access control devices. With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when. Intuitive SMARTair software enables all day-to-day administration from a central control point. "SMARTair is a very secure access control system that is also very intuitive for user and access management,” says Jose Alfonso Suarez Torres, Operations Chief at ASUCQ. Future plans for ASUCQ envision a ‘university city’ with up to 20,000 students — all protected in real time with SMARTair access control. And because a SMARTair system is wireless, expanding and upgrading access control will never disrupt the daily work or campus life at this fast-growing university. SMARTair Mobile Solution Openow A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app The new SMARTair mobile solution, Openow also gives facility managers the option to send, revoke and amend the validity of users’ keys, wherever they (or the keyholder) may be — with no need for physical credentials like keys or smart-cards. Students and staff save time, with no access cards to collect or validate. Each user installs and validates their Openow app and collects keys virtually. Tap a SMARTair escutcheon with your phone... and the door unlocks, if you are authorized to enter. Administrators save time and resource at the end of a student or staff member’s time on campus. A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app. A simple, secure, modern solution to university access control.

Read more

Company in profile

List your company

Increase your online visibility and get found by relevant security professionals.