Honeywell WIN-PAK® SE With Galaxy Dimension And 'Performance' DVR Integration
Honeywell WIN-PAK® SE With Galaxy Dimension And 'Performance' DVR Integration

WIN-PAK® SE Service Pack 2 with HRDP Performance Series and Galaxy Dimension integration offers a single interface that combines access control and video with intrusion. The software can control and manage employee or customer access to designated or restricted areas in many types of facilities and businesses. The integrated solution is ideal for areas such as small office buildings, employee and delivery doors, pharmacies, off-licences, day care facilities, warehouses, restaurants and hospitals."Our latest version of WIN-PAK SE now enables customers to integrate with HRDP Performance Series Digital Video Recorders (DVRs) and Galaxy Dimension intrusion panels as a cost-effective, entry-level security integration platform," said René von Franquemont, access control product marketing manager for Honeywell Systems Group EMEA. "It combines Honeywell's latest innovative security products into a powerful, comprehensive security solution for customers."WIN-PAK SE allows users to manage three separate systems through a single, easy-to-use software interface, which not only saves time and money, but also improves the level of security by eliminating user code sharing. Other benefits of the integrated WIN-PAK SE with HRDP DVR and Galaxy Dimension system include:Fast and easy setup - A step-by-step installation wizard makes setup quick and easy.Retrieve recorded video quickly - The seamless integration with Honeywell HRDP DVRs facilitates easy identification, retrieval and playback of events and alarms.Greater sales opportunities for installers - Because it provides a three-in-one solution, installers are able to offer end-users substantial enhancements to existing systems or significantly improve the operation of new security systems by reducing training and labour.Incremental revenue advantages - The new WIN-PAK SE software provides installers with the opportunity to add digital video and/or intrusion functionality to existing access installations as customer needs change, creating additional revenue and increased customer retention."It takes a unique software interface to effectively harness the power of our intrusion panels," said Drew Aitken, product marketing manager for Honeywell Security and Communications EMEA. "WIN-PAK SE with HRDP and Galaxy Dimension integration delivers this power in a big way. By tying together Honeywell's premier products of access, intrusion and video, it offers a versatile solution that meets customer needs of today without sacrificing the needs of tomorrow."For further information click here

Add to Compare
Honeywell Releases New Features To Popular Pro-Watch Access Control System
Honeywell Releases New Features To Popular Pro-Watch Access Control System

Honeywell recently released several software enhancements to its widely used Pro-Watch® security management system. The Pro-Watch 3.81 software upgrades are designed to simplify installation and ease of use, as well as reduce costs and maximize system efficiency. The upgrades include:   Software-based licence keys that eliminate the need for a hardware USB dongle to ensure the integrity of the licence and maintain compatibility with virtualisation and other IT-centric solutions. Inclusion of the S-Net protocol on the PW-6000 provides a smooth migration path from legacy Star I controllers to current technology, which allows end users to leverage existing security investments. Virtualisation support with VMware and Microsoft Hyper-V, which enables an organization’s IT staff to host Pro-Watch as a virtual server, which reduces server management expenses and service interruptions.   Additionally, Pro-Watch 3.81 features open integration with the Honeywell Software Development Kit (HSDK), which enables increased interoperability between Honeywell technologies and products from third-party manufacturers who participate in the Honeywell Open Technology Alliance (HOTA) programme. The compatibility of Pro-Watch with the HSDK allows easy integration with larger building control systems such as heating, ventilation and air conditioning (HVAC) and other building management technologies to drive energy savings.  Pro-Watch also integrates various security components including visitor management, IP and video surveillance, intrusion, and communications such as intercom and mass notification technology.   “We understand that cost containment, enhanced profitability and return on investment are all important for our customers,” Aymet said. “Pro-Watch offers an open architecture platform that offers advanced levels of integration and greatly increases our customers’ ability to achieve their financial goals.”   Pro-Watch is available to certified Honeywell Integrated Security Integrators only.

Add to Compare
Reliance High-Tech Selects Honeywell Technology For New Managed Access Control Offering
Reliance High-Tech Selects Honeywell Technology For New Managed Access Control Offering

Reliance High-Tech - an Elite member of the Honeywell Systems Integrator Programme - has selected Honeywell's WIN-PAK™ PRO Central Station software to power its new managed access control solution. The service, which will be hosted by the dedicated Reliance Monitoring Centre in West Yorkshire, will potentially generate significant additional monthly recurring revenues for Reliance through the provision of ongoing remote managed access control services to its customers. Remote managed access control presents the ideal security solution for both Small to Medium Enterprises wishing to install access control for the first time, as well as existing access control customers who want to switch from a locally based system to a more cost effective and flexible remote managed solution. The WIN-PAK™ PRO Central Station remote managed access control software from Honeywell will reduce installation and service costs for both Reliance High-Tech and its customers in a number of ways including removing the need for dedicated on-site PCs at customer premises, reducing end-user training requirements and facilitating remote servicing. The scalability offered by remotely managed access control will also allow Reliance High-Tech to quickly and easily adapt security solutions, depending on its customers' needs. As part of the service, Reliance High-Tech monitoring specialists will be able to remotely open and close doors on request, create customised security reports for customers and respond to on-site alarms, alerting emergency services where necessary. Customers can also access the system remotely at any time through a secure web portal if they need to add/delete badges or view the latest reports in real time. Initially set up to provide CCTV and access control support for its customers, the BS5979 Cat II Reliance Monitoring Centre quickly diversified its services to include command and control, lone worker protection and asset tracking. The centre works in accordance with ISO270000 for data protection, and has a separate mirrored centre 60 miles away for contingency purposes. This latest move to extend the offering to include remote managed access control came in response to a growing customer demand for the innovative service. Reliance High Tech's long standing relationship with Honeywell made the task of choosing a technology partner for the service a simple one. "Reliance High Tech has been installing Honeywell WIN-PAK™ technology for many years and our teams are extremely familiar with the strong technical capabilities, user friendly interface and database management functionality of the range," said Dan Thomas, sales and marketing director, Reliance High-Tech. "The addition of WIN-PAK™ PRO Central Station to our access control portfolio helps our customers to save money by reducing manpower and using technology more intelligently to enhance security.""In today's security environment, many organizations seek the protection provided by a comprehensive access control solution but do not want the financial burden of hosting the system locally," said Daniel Wan, UK marketing leader, Honeywell Systems Group. "Outsourcing security functions to experts such as Reliance High-Tech offers an excellent solution and allows organizations to take advantage of the very latest security technology from trusted brands like Honeywell, while simultaneously reducing overhead costs incurred."

Add to Compare
Honeywell Releases Latest Version Of WIN-PAK® SE 2.0 And WINPAK® PE 2.0 Security Management Solutions
Honeywell Releases Latest Version Of WIN-PAK® SE 2.0 And WINPAK® PE 2.0 Security Management Solutions

WIN-PAK combines access control, digital video and intrusion into one powerful system that improves scalability, capability and control of your security solution. WIN-PAK can be used to programme, operate and report access control events and is available in standard and professional editions: WIN-PAK SE 2.0 Single user (Standard Edition) with basic video integration: The single user software supports advanced access control and basic video including Rapid Eye, Fusion or HRDP Series DVRs. Depending on the application, choose Galaxy integration as an option.WIN-PAK SE 2.0 Five user (Standard Edition) with advanced video integration: The five user software supports advanced access control including advanced video support for Fusion and HRDP Series DVRs. Depending on the application, choose Galaxy integration as an option.WIN-PAK PE 2.0 (Professional Edition): The unrestricted user software supports advanced access control, including advanced video including Rapid Eye, Fusion or HRDP Series DVRs and Galaxy integration.Functions that have traditionally been tied together through physical relays and input devices are now controlled logically. Full-scale system management of single or multiple locations is possible - you can move, control or share resources across multiple locations simply by logging on to a system.WIN-PAK is easy to install and programme using Quick Start Wizards, which also offer advanced reporting capabilities that customers are demanding. Users can create customized reports or choose from a variety of predefined reports. E-mail capability has been added to allow reports and events to be sent via e-mail. Reports and events can be shown as easy-to-read text that provide all the content and detail that customers require.WIN-PAK SE/PE 2.0 offers complete enhanced Digital Video Integration to Honeywell Rapid Eye, Fusion and HRDP "Performance Series" Digital Video Recorders. Integration allows video to be linked to both access control and Galaxy intrusion events and alarms. Video clips can easily be recalled through the software, based on time or event. With integration, users can have complete camera control, including pan, tilt and zoom, and can verify live users with stored images using the video verification option.Integration with Honeywell Galaxy intrusion panels allows multiple Galaxy panels to be managed by WIN-PAK SE/PE, using floor plans and control maps to allow easy monitoring and control of most of the Galaxy functionality.

Add to Compare
Honeywell Launches New Release Of Global Security Management System
Honeywell Launches New Release Of Global Security Management System

Honeywell's Pro-Watch® 3.80 Security Management Suite simplifies overall system management through enhanced Microsoft® compatibility. Pro-Watch 3.80 includes several new advanced features made possible through improved integration with Honeywell's MAXPRO®VMS (Video Management System) and various third-party systems.Pro-Watch 3.80 supports user upgrades to new Microsoft® versions of Windows® Server 2008, SQL Server® 2008, and Windows 7. This provides a convenient way to set up groups in Windows using database privileges to streamline the manual steps involved in installation. Pro-Watch 3.80 leverages existing network infrastructure by using standard network protocol to communicate to all system components to help a facility manage access control, alarm monitoring, video badging, digital video, video surveillance and visitor management systems.Integrating with MAXPRO VMS allows Pro-Watch 3.80 to intelligently determine the capabilities of each analog or digital video device across various sites, allowing video management of any component through a unified configuration and user interface. Operators can drag and drop cameras from the Pro-Watch hardware tree into MAXPRO VMS and can use advanced features such as subject pursuit to select a central camera with a single mouse-click to track a target through a set of sequential cameras.Pro-Watch 3.80 also features enhanced integration with Honeywell's Galaxy® Dimension GD-264 and GD-512 intrusion panels to ensure a seamless security experience for end users with fewer accidental alarms and resulting fines. If a user is granted access to a building but does not have the authority to disarm the system, the integration can deny access and prevent a false alarm. In addition, critical areas are automatically armed upon exit of personnel.An advanced badging option combines badge holder and card data into easy-to-use views with access permissions by card. Advanced badging makes it easy to train badging staff and HR, and built-in saved ‘favorite' searches, audit views, and compliance reports help those individuals more effectively manage badges.Pro-Watch 3.80 also enables active monitoring and surveillance of large buildings or campuses with enhanced maps. This advanced feature includes intercom support that provides the operator with an additional layer of environmental awareness. Each door in Pro-Watch can be associated with both an intercom and a camera, allowing the dispatcher to utilize real-time video for visual verification while simultaneously communicating over the intercom. For voice functionality, the command interface facilitates operator interactions with remote intercom stations directly from the operator's personal computer. A dispatcher can interact with intercom stations via a toolbar shortcut, context-sensitive menus in the hardware tree accessed with a simple right-click, or via intercom icons added to maps."Pro-Watch is a business management tool for those who want to know who's in their buildings and tracking who's coming and going," said René von Franquemont, access control product manager, Honeywell Security Group. "It offers superior integration with third party products such as Novell and SAP to streamline mustering, visitor management, and other HR functions to help organizations interact more effectively with personnel in their buildings in real-time."Pro-Watch is available via Honeywell Integrated Security Authorized Integrators in four scalable editions (Lite, Professional, Corporate and Enterprise) that allow system expansion without changing the user interface or database structure. Visit Honeywell's homepage.

Add to Compare

Access control software - Expert commentary

Unlocking human-like perception in sensor-based technology deployments
Unlocking human-like perception in sensor-based technology deployments

Like most industries, the fields of security, access, and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation. In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have access to accurate data generated by best-of-class solutions irrespective of the sensor modality. And, they need to be able to easily deploy such solutions, at the lowest capex and opex, with the knowledge that they can be integrated with preferred VMSs and PSIMs, be highly reliable, have low install and maintenance overheads and be well supported. With these needs in mind, camera and computer vision technology providers, solutions providers, and systems integrators are forging ahead and have created exemplary ecosystems with established partnerships helping to accelerate adoption. At the heart of this are AI and applications of Convolutional neural networks (CNN), an architecture often used in computer vision deep learning algorithms, which are accomplishing tasks that were extremely difficult with traditional software. But what about 3D sensing technologies and perception? The security, safety, and access market have an additional crucial need: they must mitigate risk and make investments that deliver for the long-term. This means that if a systems integrator invests in a 3D sensing data perception platform today, it will support their choice of sensors, perception strategies, applications, and use cases over time without having to constantly reinvest in alternative computer hardware and perception software each time they adopt new technology or systems. This begs the question - if the security industry knows what it needs, why is it yet to fully embrace 3D sensing modalities? Perception strategy Intelligent perception strategies are yet to evolve which sees designers lock everything down at the design phaseWell, one problem facing security, safety, and access solutions providers, systems integrators, and end-users when deploying first-generation 3D sensing-based solutions is the current approach. Today, intelligent perception strategies have yet to evolve beyond the status quo which sees designers lock everything down at the design phase, including the choice of the sensor(s), off-the-shelf computer hardware, and any vendor-specific or 3rd party perception software algorithms and deep learning or artificial intelligence. This approach not only builds in constraints for future use-cases and developments, it hampers the level of perception developed by the machine. Indeed, the data used to develop or train the perception algorithms for security, access, and safety use cases at design time is typically captured for a narrow and specific set of scenarios or contexts and are subsequently developed or trained in the lab. Technology gaps As those in this industry know too well, siloed solutions and technology gaps typically block the creation of productive ecosystems and partnerships while lack of commercial whole products can delay market adoption of new innovation. Perception systems architectures today do not support the real-time adaptation of software and computing engines in the field. They remain the same as those selected during the design phase and are fixed for the entire development and the deployment stage. Crucially, this means that the system cannot deal with the unknowns of contextually varying real-time situations where contexts are changing (e.g being able to reflex to security situations they haven’t been trained for) and where the autonomous system’s perception strategies need to dynamically adjust accordingly. Ultimately, traditional strategies have non-scalable and non-adaptable competing computing architectures that were not designed to process the next generation of algorithms, deep learning, and artificial intelligence required for 3D sensor mixed workloads. What this means for industries seeking to develop or deploy perception systems, like security, access, and safety, is that the available computing architectures are generic and designed for either graphic rendering or data processing. Solutions providers, therefore, have little choice but to promote these architectures heavily into the market. Consequently, the resulting computing techniques are defined by the computing providers and not by the software developers working on behalf of the customer deploying the security solution. Context…. we don’t know what we don’t know Perception platform must have the ability to adjust to changes in context, thereby improving the performance post-deployment To be useful and useable in the security context and others, a perception platform must have the ability to adjust to changes in context, can self-optimize, and crucially, can self-learn, thereby improving the performance post-deployment. The combinations of potential contextual changes in a real-life environment, such as an airport or military base, are innumerable, non-deterministic, real-time, often analog, and unpredictable. The moment sensors, edge computing hardware, and perception software are deployed in the field, myriad variables such as weather, terrain as well as sensor mounting location and orientation all represent a context shift where the perception systems’ solution is no longer optimal. For example, it might be that a particular sensor system is deployed in an outdoor scenario with heavy foliage. Because the algorithm development or training was completed in the lab, the moving foliage, bushes, or low trees and branches are classified as humans or some other false-positive result. Typically, heavy software customization and onsite support then ensue, requiring on-site support by solutions vendors where each and every sensor configuration needs to be hand-cranked to deliver something that is acceptable to the end customer. A new approach for effective perception strategies Cron AI is building senseEDGE, which represents a significant evolution in the development of sensing to information strategy.  It is a 3D sensing perception and computer vision platform built from the ground up to address and remove the traditional deployment and performance bottlenecks we’ve just described. senseEDGE is aware of the user application reaction plan indication to trigger an alarm or turning on a CCTV camera The entire edge platform is built around a real-time scalable and adaptable computing architecture that’s flexible enough for algorithms and software to scale and adapt to different workloads and contexts. What’s more, it has real-time contextual awareness, which means that the entire edge platform is, at any time, aware of the external context, the sensor and sensor architecture, and the requirements of the user application. Furthermore, when it produces the object output data, it also aware of the user application reaction plan indication, which could be triggering an alarm or turning on a CCTV camera when a specific action is detected. This approach turns traditional perception strategies on their head: it is software-defined programmable perception and computing architecture, not hardware-defined. It is free from the constraints imposed by traditional CPU or GPU compute dictated by hardware architecture providers and not limited to the perception built defined during design time. And, being fully configurable, it can be moved from one solution to another, providing computation for different modalities of sensors designed for different use cases or environments, and lower risk of adoption and migration for those developing the security solution.  Future perception requirements senseEDGE is also able to scale to future perception requirements, such as algorithms and workloads produced by future sensors as well as computational techniques and neural networks that have yet to be invented. Meanwhile, latency versus throughput is totally software-defined and not limited by providers of computing architecture. Finally, contextually aware, it is fully connected to the real world where the reflexes adapt to even the subtlest changes in context, which makes all the difference in time and accuracy in critical security situations. This is how CronAI sees the future of perception. It means that security and safety innovators can now access and invest with low risk in a useable and scalable perception solution that can truly take advantage of current and future 3D sensor modalities.

Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center
Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center

Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.

How Businesses Can Prepare Their Communications Infrastructure And Critical Event Management Plans For The Next Chapter Of The Pandemic
How Businesses Can Prepare Their Communications Infrastructure And Critical Event Management Plans For The Next Chapter Of The Pandemic

The global pandemic has created a working environment filled with uncertainty and, at times, fear, as COVID-19 cases surge yet again and businesses continue to navigate a complex web of infectious disease mitigation protocols and managing the distribution of a potential vaccine. Organizations are operating in an environment where a critical event, posing significant risk to its employees and daily operations, could occur at any moment. Even with a vaccine showing light at the end of a very dark tunnel, the pandemic unfortunately may be far from over, and the communication of accurate public health information to a widely distributed, often remote workforce is vital to keeping employees safe and businesses running. Organizations that plan ahead, invest in an emergency management system and share key updates quickly, reliably and securely, can keep employees safe while ensuring business continuity when it matters most. Taking time to plan and prepare Throughout the pandemic, U.S. offices have gone through alternating stages of reopening and re-closing Throughout the pandemic, U.S. offices have gone through alternating stages of reopening and re-closing. However, whether businesses are operating at a limited or full capacity, medical experts are expecting continuous waves of COVID-19 cases, as community transmission continues to hit record highs. The only way for businesses to keep their employees and customers safe, protect their operations, and retain trust with their key stakeholders during these tumultuous times is to be proactive in nature. Organizations need to put a business resiliency plan in place now that outlines key actions to take if (or when) an issue relating to local spread of the novel coronavirus arises. By having a plan in place and practicing it regularly, organizations can minimize risks and maximize employee safety surrounding critical events, such as suspected or confirmed exposure to COVID-19 in the workplace. Context of emergency management Ensuring the safety of employees (and others within the company’s facilities) needs to be the number one priority for organizations; and in any crisis scenario, a prepared and practiced plan maximizes a company’s chances of success. In PwC's 2019 Global Crisis Survey, business leaders across a range of industries shared their experiences, expectations, and top strengths and weaknesses in the context of emergency management. By a wide margin (54% vs. 30%), organizations that had a crisis response plan in place fared better post-crisis than those who didn’t. When it comes to ensuring the wellbeing of staff, businesses need to think through a comprehensive, iterative infectious disease mitigation and operational continuity strategy and practice it as often as possible. Investing in proper technology A vital step in adequate critical event management planning is investing in the proper technology infrastructure For today’s modern organization, a vital step in adequate critical event management planning is investing in the proper technology infrastructure to streamline the communication of vital information. Organizations should explore risk intelligence, critical communication and incident management software to keep their people safe, informed, and connected during critical events - and, thankfully, decision-makers are starting to take note. The Business Continuity Institute 2020 Emergency Communications Report found that 67% of organizations at least use emergency notification and/or crisis management tools. Reliable risk intelligence system Building upon that trend, a reliable risk intelligence system can anticipate and analyze the potential impact of incidents, such as increases in local cases of COVID-19, send vital updates to a distributed workforce of any size on multiple devices regarding infectious disease mitigation protocols and public health directives, and then help incident response teams virtually collaborate while maintaining compliance standards. Automating as much of this process as possible through technology allows human decision makers to efficiently and effectively focus their time, effort and expertise on what matters most in a crisis situation - implementing sound operational continuity strategies and, more importantly, ensuring employees’ safety and well-being are prioritized and appropriately considered when stress rises. Communicating vital updates This is the cultural component of incident management based on emotional intelligence, empathy, effective employee engagement, and authentic listening that makes or breaks an organization’s response to challenging situations. Employees must be aware at a moment’s notice to stay away from or exit contaminated areas If employees are exposed in the workplace to a confirmed or suspected case of COVID-19, employers must be prepared to quickly update staff on vital next steps, as outlined by the CDC and other public health authorities, and arm key functions - such as security operations, HR, facility management, legal and compliance - with the information they need to mitigate potential spread of the virus, including:   Closing/cleaning the office: Employees must be aware at a moment’s notice to stay away from or exit contaminated areas. From there, it is critical that businesses communicate clearly with cleaning staff to follow procedure, use the right disinfecting products and sanitise high-touch surfaces. Alerting key groups that may have been exposed: Employers have a duty to rapidly notify workers of potential exposure to COVID-19. Having the proper communication infrastructure in place can streamline contact-tracing as well as the subsequent testing process, and save vital time. Ensuring work-from-home continuity or diverting workflows to alternative physical environments: Every work environment looks different today. Whether an organization is managing a distributed workforce, full-capacity essential workers or something in between, there needs be a communication system in place to ensure business continuity. Outlining next steps for reopening: After a potential exposure, employees require the proper reassurance that they will be returning to a safe working environment in an organized, thoughtful manner, which is aligned to public health best practices. Whether it is coordinating a limited capacity return to the office or outlining new infectious disease mitigation protocols - such as steps for receiving a vaccine in the coming months - employees must continue to be updated quickly, comprehensively, and often. Incident management technology There is no doubt that organizations will continue to face a myriad of challenges as they navigate business operations during the pandemic into 2021, as the general public awaits the broad deployment of a vaccine. Public and private sector leaders still have months ahead of them before daily operations even begin to resemble “business as usual.” To best prepare for the next chapter of the global pandemic, organizations should outline a plan tailored to infectious disease mitigation protocols; explore augmenting their crisis management policies with risk intelligence, crisis management and incident management technology; and focus employee communications on containing and rapidly resolving events associated with COVID-19 exposure. Keeping employees safe, informed, and connected during critical events are mandatory considerations for leaders as they analyze existential threats to their business in 2021 and beyond.

Latest Honeywell news

ASSA ABLOY Integrates Aperio Wireless Lock Technology With Connect ONE Platform From Connected Technologies
ASSA ABLOY Integrates Aperio Wireless Lock Technology With Connect ONE Platform From Connected Technologies

ASSA ABLOY Opening Solutions completed the integration of their Aperio® wireless lock technology with the Connect ONE® cloud-hosted management platform from Connected Technologies, Monument, Colo. Connect ONE manages all connected customer devices, including wireless and hardwired locks, access control, intrusion, video surveillance, critical environmental monitoring and energy management from a single interface. “We’re excited to present this integration with industry leading ASSA ABLOY Aperio wireless devices to Connect ONE dealers,” said Mike Simon, Managing Partner of Connected Technologies. Global wireless platform “Now, dealers can easily expand their services to more doors and offer new protection possibilities that save installation time and money. In addition, the Aperio/Connect ONE integration works with popular Bosch, DMP, ELK and Honeywell Vista panels so they can be up and running with new specs quickly.” The Aperio integration offers Connect ONE customers an easy way to connect additional wireless locks to new and existing installations. Aperio is a global wireless platform that works with extensive locking hardware options from ASSA ABLOY Group brands, offering the flexibility to address a variety of applications throughout any facility. The platform uses wireless communication (IEEE 802.15.4) between the lock and an Aperio hub to provide real-time communication to the access control system, simplifying installation and reducing costs. Encrypted wireless connection The integration also allows for a mapped hardwired relay output to initiate an auxiliary control upon access Aperio wireless locks map directly to the intrusion areas for an immediate armed status review to deny access when armed and can also disarm intrusion with proper authority upon granted access at the lock. Since the wireless locks are highly integrated with the control panel, user permissions are applied exactly the same for hardwired readers, allowing for a mix of wireless and hardwired reader/locks without additional set-up complexity. The integration also allows for a mapped hardwired relay output to initiate an auxiliary control upon access and a relay output to control an external door opener. Aperio locks use an encrypted wireless connection to an Aperio IP hub; each hub can communicate to a maximum of 64 locks. Highly flexible solution “Connect ONE offers a simple, scalable solution that complements the Aperio offering perfectly,” stated Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions Americas. “This integration will offer dealers and end-users a highly flexible solution for comprehensive access management.” Connect One’s ScanPass® Mobile Credential smartphone control is also supported with the integration, eliminating the need for card or fob credentials. Dealers can contact ASSA ABLOY to become certified to offer Aperio locks, which come in a variety of form factors and can be purchased through ASSA ABLOY Authorized Channel Partners.

Sydney’s Gateway Building integrates Boon Edam Turnstiles with IDEMIA’s MorphoWave touchless scanners and Honeywell access control
Sydney’s Gateway Building integrates Boon Edam Turnstiles with IDEMIA’s MorphoWave touchless scanners and Honeywell access control

Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorized and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorized to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorized fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilize the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorized entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.

Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker
Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”

Related white papers

Cloud Video and Smart Cities

Physical Access Control In Higher Education

A Brief History of Access Control Credentials