Honeywell Security Access Control Softwares (11)
WIN-PAK® SE Service Pack 2 with HRDP Performance Series and Galaxy Dimension integration offers a single interface that combines access control and video with intrusion. The software can control and manage employee or customer access to designated or restricted areas in many types of facilities and businesses. The integrated solution is ideal for areas such as small office buildings, employee and delivery doors, pharmacies, off-licences, day care facilities, warehouses, restaurants and hospitals."Our latest version of WIN-PAK SE now enables customers to integrate with HRDP Performance Series Digital Video Recorders (DVRs) and Galaxy Dimension intrusion panels as a cost-effective, entry-level security integration platform," said René von Franquemont, access control product marketing manager for Honeywell Systems Group EMEA. "It combines Honeywell's latest innovative security products into a powerful, comprehensive security solution for customers."WIN-PAK SE allows users to manage three separate systems through a single, easy-to-use software interface, which not only saves time and money, but also improves the level of security by eliminating user code sharing. Other benefits of the integrated WIN-PAK SE with HRDP DVR and Galaxy Dimension system include:Fast and easy setup - A step-by-step installation wizard makes setup quick and easy.Retrieve recorded video quickly - The seamless integration with Honeywell HRDP DVRs facilitates easy identification, retrieval and playback of events and alarms.Greater sales opportunities for installers - Because it provides a three-in-one solution, installers are able to offer end-users substantial enhancements to existing systems or significantly improve the operation of new security systems by reducing training and labour.Incremental revenue advantages - The new WIN-PAK SE software provides installers with the opportunity to add digital video and/or intrusion functionality to existing access installations as customer needs change, creating additional revenue and increased customer retention."It takes a unique software interface to effectively harness the power of our intrusion panels," said Drew Aitken, product marketing manager for Honeywell Security and Communications EMEA. "WIN-PAK SE with HRDP and Galaxy Dimension integration delivers this power in a big way. By tying together Honeywell's premier products of access, intrusion and video, it offers a versatile solution that meets customer needs of today without sacrificing the needs of tomorrow."For further information click hereAdd to Compare
When scores of visitors pass through the entrances of large facilities, ineffective visitor management can compromise the security afforded by significant investments in perimeter security and access control.Honeywell's award winning Electronic Visitor Management System LobbyWorks™ can contribute substantially to the safety and protection of both personnel and property. The ability to automatically screen and track visitors is an essential part of a complete security plan.The LobbyWorks™ Suite offers a simple and cost effective way to:Determine who is in your facility at all times Identify unwanted visitors Eliminate abuse of visitor badges Protect the confidentiality of visitors Facilitate communication between hosts, visitors, and security personnel Improve lobby and security desk productivityAdd to Compare
Honeywell recently released several software enhancements to its widely used Pro-Watch® security management system. The Pro-Watch 3.81 software upgrades are designed to simplify installation and ease of use, as well as reduce costs and maximize system efficiency. The upgrades include: Software-based licence keys that eliminate the need for a hardware USB dongle to ensure the integrity of the licence and maintain compatibility with virtualisation and other IT-centric solutions. Inclusion of the S-Net protocol on the PW-6000 provides a smooth migration path from legacy Star I controllers to current technology, which allows end users to leverage existing security investments. Virtualisation support with VMware and Microsoft Hyper-V, which enables an organization’s IT staff to host Pro-Watch as a virtual server, which reduces server management expenses and service interruptions. Additionally, Pro-Watch 3.81 features open integration with the Honeywell Software Development Kit (HSDK), which enables increased interoperability between Honeywell technologies and products from third-party manufacturers who participate in the Honeywell Open Technology Alliance (HOTA) programme. The compatibility of Pro-Watch with the HSDK allows easy integration with larger building control systems such as heating, ventilation and air conditioning (HVAC) and other building management technologies to drive energy savings. Pro-Watch also integrates various security components including visitor management, IP and video surveillance, intrusion, and communications such as intercom and mass notification technology. “We understand that cost containment, enhanced profitability and return on investment are all important for our customers,” Aymet said. “Pro-Watch offers an open architecture platform that offers advanced levels of integration and greatly increases our customers’ ability to achieve their financial goals.” Pro-Watch is available to certified Honeywell Integrated Security Integrators only.Add to Compare
Reliance High-Tech - an Elite member of the Honeywell Systems Integrator Programme - has selected Honeywell's WIN-PAK™ PRO Central Station software to power its new managed access control solution. The service, which will be hosted by the dedicated Reliance Monitoring Centre in West Yorkshire, will potentially generate significant additional monthly recurring revenues for Reliance through the provision of ongoing remote managed access control services to its customers. Remote managed access control presents the ideal security solution for both Small to Medium Enterprises wishing to install access control for the first time, as well as existing access control customers who want to switch from a locally based system to a more cost effective and flexible remote managed solution. The WIN-PAK™ PRO Central Station remote managed access control software from Honeywell will reduce installation and service costs for both Reliance High-Tech and its customers in a number of ways including removing the need for dedicated on-site PCs at customer premises, reducing end-user training requirements and facilitating remote servicing. The scalability offered by remotely managed access control will also allow Reliance High-Tech to quickly and easily adapt security solutions, depending on its customers' needs. As part of the service, Reliance High-Tech monitoring specialists will be able to remotely open and close doors on request, create customised security reports for customers and respond to on-site alarms, alerting emergency services where necessary. Customers can also access the system remotely at any time through a secure web portal if they need to add/delete badges or view the latest reports in real time. Initially set up to provide CCTV and access control support for its customers, the BS5979 Cat II Reliance Monitoring Centre quickly diversified its services to include command and control, lone worker protection and asset tracking. The centre works in accordance with ISO270000 for data protection, and has a separate mirrored centre 60 miles away for contingency purposes. This latest move to extend the offering to include remote managed access control came in response to a growing customer demand for the innovative service. Reliance High Tech's long standing relationship with Honeywell made the task of choosing a technology partner for the service a simple one. "Reliance High Tech has been installing Honeywell WIN-PAK™ technology for many years and our teams are extremely familiar with the strong technical capabilities, user friendly interface and database management functionality of the range," said Dan Thomas, sales and marketing director, Reliance High-Tech. "The addition of WIN-PAK™ PRO Central Station to our access control portfolio helps our customers to save money by reducing manpower and using technology more intelligently to enhance security.""In today's security environment, many organizations seek the protection provided by a comprehensive access control solution but do not want the financial burden of hosting the system locally," said Daniel Wan, UK marketing leader, Honeywell Systems Group. "Outsourcing security functions to experts such as Reliance High-Tech offers an excellent solution and allows organizations to take advantage of the very latest security technology from trusted brands like Honeywell, while simultaneously reducing overhead costs incurred."Add to Compare
WIN-PAK combines access control, digital video and intrusion into one powerful system that improves scalability, capability and control of your security solution. WIN-PAK can be used to programme, operate and report access control events and is available in standard and professional editions: WIN-PAK SE 2.0 Single user (Standard Edition) with basic video integration: The single user software supports advanced access control and basic video including Rapid Eye, Fusion or HRDP Series DVRs. Depending on the application, choose Galaxy integration as an option.WIN-PAK SE 2.0 Five user (Standard Edition) with advanced video integration: The five user software supports advanced access control including advanced video support for Fusion and HRDP Series DVRs. Depending on the application, choose Galaxy integration as an option.WIN-PAK PE 2.0 (Professional Edition): The unrestricted user software supports advanced access control, including advanced video including Rapid Eye, Fusion or HRDP Series DVRs and Galaxy integration.Functions that have traditionally been tied together through physical relays and input devices are now controlled logically. Full-scale system management of single or multiple locations is possible - you can move, control or share resources across multiple locations simply by logging on to a system.WIN-PAK is easy to install and programme using Quick Start Wizards, which also offer advanced reporting capabilities that customers are demanding. Users can create customized reports or choose from a variety of predefined reports. E-mail capability has been added to allow reports and events to be sent via e-mail. Reports and events can be shown as easy-to-read text that provide all the content and detail that customers require.WIN-PAK SE/PE 2.0 offers complete enhanced Digital Video Integration to Honeywell Rapid Eye, Fusion and HRDP "Performance Series" Digital Video Recorders. Integration allows video to be linked to both access control and Galaxy intrusion events and alarms. Video clips can easily be recalled through the software, based on time or event. With integration, users can have complete camera control, including pan, tilt and zoom, and can verify live users with stored images using the video verification option.Integration with Honeywell Galaxy intrusion panels allows multiple Galaxy panels to be managed by WIN-PAK SE/PE, using floor plans and control maps to allow easy monitoring and control of most of the Galaxy functionality.Add to Compare
Honeywell's Pro-Watch® 3.80 Security Management Suite simplifies overall system management through enhanced Microsoft® compatibility. Pro-Watch 3.80 includes several new advanced features made possible through improved integration with Honeywell's MAXPRO®VMS (Video Management System) and various third-party systems.Pro-Watch 3.80 supports user upgrades to new Microsoft® versions of Windows® Server 2008, SQL Server® 2008, and Windows 7. This provides a convenient way to set up groups in Windows using database privileges to streamline the manual steps involved in installation. Pro-Watch 3.80 leverages existing network infrastructure by using standard network protocol to communicate to all system components to help a facility manage access control, alarm monitoring, video badging, digital video, video surveillance and visitor management systems.Integrating with MAXPRO VMS allows Pro-Watch 3.80 to intelligently determine the capabilities of each analog or digital video device across various sites, allowing video management of any component through a unified configuration and user interface. Operators can drag and drop cameras from the Pro-Watch hardware tree into MAXPRO VMS and can use advanced features such as subject pursuit to select a central camera with a single mouse-click to track a target through a set of sequential cameras.Pro-Watch 3.80 also features enhanced integration with Honeywell's Galaxy® Dimension GD-264 and GD-512 intrusion panels to ensure a seamless security experience for end users with fewer accidental alarms and resulting fines. If a user is granted access to a building but does not have the authority to disarm the system, the integration can deny access and prevent a false alarm. In addition, critical areas are automatically armed upon exit of personnel.An advanced badging option combines badge holder and card data into easy-to-use views with access permissions by card. Advanced badging makes it easy to train badging staff and HR, and built-in saved ‘favorite' searches, audit views, and compliance reports help those individuals more effectively manage badges.Pro-Watch 3.80 also enables active monitoring and surveillance of large buildings or campuses with enhanced maps. This advanced feature includes intercom support that provides the operator with an additional layer of environmental awareness. Each door in Pro-Watch can be associated with both an intercom and a camera, allowing the dispatcher to utilize real-time video for visual verification while simultaneously communicating over the intercom. For voice functionality, the command interface facilitates operator interactions with remote intercom stations directly from the operator's personal computer. A dispatcher can interact with intercom stations via a toolbar shortcut, context-sensitive menus in the hardware tree accessed with a simple right-click, or via intercom icons added to maps."Pro-Watch is a business management tool for those who want to know who's in their buildings and tracking who's coming and going," said René von Franquemont, access control product manager, Honeywell Security Group. "It offers superior integration with third party products such as Novell and SAP to streamline mustering, visitor management, and other HR functions to help organizations interact more effectively with personnel in their buildings in real-time."Pro-Watch is available via Honeywell Integrated Security Authorized Integrators in four scalable editions (Lite, Professional, Corporate and Enterprise) that allow system expansion without changing the user interface or database structure. Visit Honeywell's homepage.Add to Compare
Browse Access Control Softwares
- Photo ID
- Honeywell Security
Access control software products updated recently
Amongst the many negative consequences of the pandemic is a rise in violent and abusive behavior across society. Health workers have experienced it on a regular basis. So too have police officers and public transport workers. Unfortunately, violence and abuse towards shop workers is also endemic in British society. To address this problem which, in truth, has been on the rise since long before the emergence of COVID-19, we need better deterrents. The ability to prosecute these offenses is one such deterrent, but just as important is the ability to deescalate situations before they spill over into unacceptable or unlawful behavior. Major retail customers In both instances, organizations of all sizes are now recognizing that the answer could involve greater use of rapidly advancing body worn camera technology. Andy Marsh, the Chief Constable of Avon and Somerset Police, is one of the police officers responsible for introducing body worn cameras to the UK police force, where they are now in widespread use. Andy Marsh is one of the police officers responsible for introducing body worn cameras to the UK police force He explains that “The reason the majority of people don’t speed or drink-drive is that rational human beings weigh up the risk and consequences of breaking the law and getting caught. Body worn cameras help provide appropriate ‘desistance’, especially where there are forward-facing screens so the person interacting with the wearer can see themselves and their behavior.” Evidence shows that if a forward-facing camera is switched on before the intervention becomes hostile, it will generally lead to a de-escalation – as often as 90% of the time, according to one of our major retail customers. Digital evidence investigations Only a tiny handful of abusive incidents ever translate into arrests and prosecutions. A key issue is a lack of clear evidence – how to get past the usual impasse of one person’s word against the other. Body worn cameras break the deadlock and allow organizations to report incidents to the police with confidence, knowing that they will lead to action. Marsh suggests that “We usually see an earlier admission, an earlier guilty plea and a more appropriate sentence, where body worn camera footage is in play.” The technology has come on in leaps and bounds in recent years. For example, it’s now possible to record high-definition footage on a lightweight device that’s barely the size of a palm. And it’s not just about the evidence organizations gather themselves. Many police forces are looking at ways to make it easier for businesses and the public to collaborate on digital evidence investigations. Body worn cameras This is good for the victims of crime because it means we get the evidence more quickly" “We’ve created an online crime portal in Avon and Somerset which people can use to pass digital evidence and material to us without an officer having to attend their premises. This is good for the victims of crime because it means we get the evidence more quickly and can take action more swiftly to resolve that issue,” adds Marsh. Our body worn cameras can now even support facial recognition thanks to new, smart AI on the devices themselves, which can scan and process faces within a three-meter distance against a pre-defined database of people (which we call a watchlist). Any matches trigger alerts or additional camera activity such as recording and streaming, while the facial recognition data of people not on the watchlist itself is not recorded or saved to assuage privacy concerns. Similar criminal behavior Where could this technology come in handy? Well, staff at gambling venues or in-store retail workers could undoubtedly benefit from the ability to quickly spot known fraudsters or addicts who have requested that venues refuse their custom. Stewards at mass sporting events could play a key role in helping to identify people who have been banned from attending. The primary reason for using body worn cameras is to increase the safety of frontline workers The primary reason for using body worn cameras is to increase the safety of frontline workers, deescalating confrontations and limiting the use of force. AI-powered facial recognition can also serve this purpose by helping them make better-informed choices about how to handle specific situations. For example, it is a massive advantage to police officers on the beat to understand that the person they are dealing with may have a history of similar criminal behavior. Facial recognition technology But it’s also an advantage within retail, where aggressive incidents are on the rise and staff need all the help they can get to determine what an appropriate response should be to a particular customer incident. In fact, extensive consultation with our retail, police, transport and gambling customers indicates that introducing facial recognition technology to body worn cameras could be instrumental, not just in helping to prevent crime, but in tracking down vulnerable and missing people too. Of course, facial recognition technology has to be balanced against the need to protect the privacy of ordinary citizens. Video recording using body worn cameras has to be done proportionately – the same is true for the use of facial recognition technology. The technology also has to be compliant with GDPR, Data Protection, the Information Commissioners recommendations and so on. Positive working environment Violent and abusive incidents affect everyone in the immediate vicinity and create a culture of fear Importantly, it should be for a specific, proportionate and justifiable reason which, of course, means it should never be used for indiscriminate mass surveillance. Every organization using this technology must remember that a facial recognition system match is not proof of someone’s identity, but rather, an indication of likelihood to help inform the user rather than dictate the course of action. Violent and abusive incidents affect everyone in the immediate vicinity and create a culture of fear and apprehension. This is why it’s so important to get on top of the problem – both on a societal and at an organizational level. Body worn cameras have a vital role to play, as an evidence-gathering tool and as a deterrent that empowers the wearer and creates a more positive working environment. Deterring unlawful behavior One of the critical roles these cameras play is in staff training, providing real-world video evidence that can be used to educate and upskill workers across a variety of industries. Society’s problem with abusive and violent behavior cannot be solved by technology alone. But with exceptional quality camera footage now a reality, and the possibility of AI technology at the device level in real-time, body worn cameras will only get better at deterring unlawful behavior and helping to protect hardworking frontline staff. Alasdair Field is CEO of video technology provider Reveal, which works with UK police forces and major brands such as Matalan, JD Sports and Boots to help them improve staff safety, deescalate confrontations and reduce violent and abusive incidents.
Have you ever stopped to consider the volume of new data created daily on social media? It’s staggering. Take Twitter, for instance. Approximately 500 million tweets are published every day, adding up to more than 200 billion posts per year. On Facebook, users upload an additional 350 million photos per day, and on YouTube, nearly 720,000 hours of new video content is added every 24 hours. While this overwhelming volume of information may be of no concern to your average social media user posting updates to keep up with family and friends, it’s of particular interest to corporate security and safety professionals who are increasingly using it to monitor current events and detect potential risks around their people and locations—all in real-time. Meet the fast-paced and oft-confusing world of open-source intelligence (OSINT). What is Open Source Intelligence (OSINT)? The U.S. Department of State defines OSINT as, “intelligence that is produced from publicly available information and is collected, exploited, and disseminated promptly to an appropriate audience to address a specific intelligence requirement.” The concept of monitoring and leveraging publicly available information sources for intelligence purposes dates back to the 1930s. The British Broadcast Corporation (BBC) was approached by the British government and asked to develop a new service that would capture and analyze print journalism from around the world. Monitoring and identifying potential threats Originally named the “Digest of Foreign Broadcast, the service (later renamed BBC Monitoring which still exists today) captured and analyzed nearly 1.25 million broadcast words every day to help British intelligence officials keep tabs on conversations taking place abroad and what foreign governments were saying to their constituents. OSINT encompasses any publicly accessible information that can be used to monitor and identify potential threats Today, OSINT broadly encompasses any publicly accessible information that can be used to monitor and identify potential threats and/or relevant events with the potential to impact safety or business operations. The potential of OSINT data is extraordinary. Not only can it enable security and safety teams to quickly identify pertinent information that may pose a material risk to their business or people, but it can also be captured by anyone with the right set of tools and training. OSINT for cybersecurity and physical threat detection Whether it be a significant weather event, supply chain disruptions, or a world health crisis few saw coming, the threats facing organizations continue to increase in size and scale. Luckily, OSINT has been able to accelerate how organizations detect, validate, and respond to these threats, and it has proved invaluable in reducing risk and informing decision-making – especially during emergencies. OSINT is typically shared in real-time, so once a situation is reported, security teams can then work on verifying critical details such as the location or time an incident occurred or provide the most up-to-date information about rapidly developing events on the ground. They can then continue to monitor online chatter about the crisis, increasing their situational awareness and speeding up their incident response times. OSINT applications OSINT can help detect when sensitive company information may have been accessed by hackers Severe weather offers a good example of OSINT in action. Say an organization is located in the Great Plains. They could use OSINT from sources like the National Weather Service or National Oceanic and Atmospheric Administration (NOAA) to initiate emergency communications to employees about tornado warnings, high winds, or other dangerous conditions as they are reported. Another common use case for OSINT involves data breaches and cyber-attacks. OSINT can help detect when sensitive company information may have been accessed by hackers by monitoring dark web messaging boards and forums. In 2019, T-Cellphone suffered a data breach that affected more than a million customers, but it was able to quickly alert affected users after finding their personal data online. OSINT is a well-established field with countless applications. Unfortunately, in an ever-changing digital world, it’s not always enough to help organizations weather a crisis. Why OSINT alone isn’t enough? One of the core challenges with leveraging OSINT data, especially social media intelligence (SOCMINT), is that much of it is unstructured and spread across many disparate sources, making it difficult to sort through, manage, and organize. Consider the social media statistics above. Assuming a business wanted to monitor all conversations on Twitter to ensure all relevant information was captured, it would need to both capture and analyze 500 million individual posts every day. Assuming a trained analyst spent just three seconds analyzing each post, that would amount to 1.5 billion seconds of labor—equivalent to 416,666 hours—just to keep pace. While technology and filters can greatly reduce the burden and help organizations narrow the scope of their analysis, it’s easy to see how quickly human capital constraints can limit the utility of OSINT data—even for the largest companies. Challenges with OSINT OSINT data collection includes both passive and active techniques, each requiring a different level of effort and skill Additionally, collecting OSINT data is time-consuming and resource-intensive. Making sense of it remains a highly specialized skill set requiring years of training. In an emergency where every second count, the time required to sift through copious amounts of information takes far longer than the time in which an organization must take meaningful action to alter the outcome. Compounding the issue, OSINT data is noisy and difficult to filter. Even trained analysts find the need to constantly monitor, search, and filter voluminous troves of unstructured data tedious. Artificial intelligence and machine learning have helped weed through some of this data faster, but for organizations with multiple locations tasked with monitoring hundreds or thousands of employees, it’s still a challenging task. Adding to the complexity, collecting OSINT data isn’t easy. OSINT data collection includes both passive and active techniques, each requiring a different level of effort and skill. Passive vs Active OSINT Passive OSINT is typically anonymous and meant to avoid drawing attention to the person requesting the information. Scrolling user posts on public social media profiles is a good example of passive OSINT. Active OSINT refers to information proactively sought out, but it often requires a more purposeful effort to retrieve it. That may mean specific login details are needed to access a website where information is stored. Lastly, unverified OSINT data can’t always be trusted. Analysts often encounter false positives or fake reports, which not only take time to confirm accuracy, but if they act on misinformation, the result could be damage to their organization’s reputation or worse. So, how can companies take advantage of it without staffing an army of analysts or creating operational headaches? A new path for OSINT Organisations can leverage the benefits of OSINT to improve situational awareness and aid decision-making Fortunately, organizations can leverage the benefits of OSINT to improve situational awareness and aid decision-making without hiring a dedicated team of analysts to comb through the data. By combining OSINT data with third-party threat intelligence solutions, organizations can get a cleaner, more actionable view of what’s happening in the world. Threat intelligence solutions not only offer speed by monitoring for only the most relevant events 24/7/365, but they also offer more comprehensive coverage of a wide range of threat types. What’s more, the data is often verified and married with location intelligence to help organizations better understand if, how, and to what extent each threat poses a risk to their people, facilities, and assets. In a world with a never-ending stream of information available, learning how to parse and interpret it becomes all the more important. OSINT is a necessary piece to any organization’s threat intelligence and monitoring system, but it can’t be the only solution. Paired with external threat intelligence tools, OSINT can help reduce risk and keep employees safe during emergencies and critical events.
In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.
The nerve center at Miami International Airport (MIA) is its Airport Operations Center (AOC), which operates around the clock, monitoring activity, responding to safety and security incidents, disseminating information and responding to requests from stakeholders throughout the airport. Incident logging at the AOC An essential daily task for the AOC team is incident logging, with approximately 70 detailed logs being created each day, and that number is set to rise, as a result of internal process changes within the department. Rupen Philloura is the Director of Terminal Operations & AOC at Miami International Airport and he explains, “The MLS logging system was a 25-year-old custom-built application. It was familiar for our operators to use, but it was unwieldy, unreliable, and inefficient. With logging being such a critical and growing aspect of our day-today operations, we needed to upgrade to a state-of-the-art unified platform.” Situator enterprise incident management system The platform chosen by the airport was the renowned enterprise incident management system, Situator, from Qognify The platform chosen by the airport was the renowned enterprise incident management system, Situator, from Qognify, a company whose solutions are trusted by airports around the world. Miami itself was already working with the company, using its NiceVision video management system (VMS) and analytics solutions across its highly distributed video surveillance system. Currently, the AOC has six Situator-powered stations from which operators monitor the airports Honeywell/EBI fire alarm and Matrix access control systems, as well as its extensive surveillance camera network. Dynamic form functionality Rupen Philloura describes the process, stating “When an alert is raised, the operator must follow a strict set of procedures for that specific event, this might simply be resetting an alarm remotely, or the dispatch of maintenance personnel. Incidents and subsequent actions need to be accurately documented for regulatory compliance purposes, but also to help us to learn and improve how we deal with incidents and events.” The need to manually enter all details has been replaced by the dynamic form functionality within Situator. It automatically populates and logs specific information relating to that incident, saving operators valuable time, and ensuring every log is of a consistently high standard. End-to-end accounts and improved logging Rupen Philloura further stated, “Together with the input of the operator, we are assured that the logs we generate and store are comprehensive end-to-end accounts, which can be quickly and reliably searched, retrieved and reviewed.” The improved logging has also had a noticeable impact on business continuity and operational efficiency, as well as providing an additional layer of protection to the airport from a regulatory standpoint. With the AOC operating a three-shift pattern, it is vitally important that change overs can be completed swiftly and nothing is overlooked. Rupen Philloura adds, “When the next shift logs on to Situator they have instant situational awareness, there is no lag in productivity. They can see what has happened and what requires their immediate attention. During their shift they no longer need to repeatedly log into multiple systems to access information. It is all there on the screen at their station.” Reduced response time to incidents The success of Situator within the AOC has led the airport to begin exploiting its strength as a powerful platform Situator has also reduced the response time to incidents, such as door alarms, as well as access requests from tenants and airport employees, by automating the interaction with the Matrix system. With the old MLS system, both use cases needed to be handled manually. The success of Situator within the AOC has led the airport to begin exploiting its strength as a powerful platform, with higher levels of task automation, ad-hoc forms, and reporting, as well as integration with airport-specific and non-specific subsystems (made easier by the API driven Situator), such as its access control system and surveillance cameras. Support for facilities management It is also evaluating its ability to support the facilities management team in ensuring the statutory maintenance of its extensive network of elevators and moving walkways. Mike Bryant is Computer Services’ Sr. Manager at Miami-Dade Aviation Department and he has been impressed not only by the reliability that the web-based Situator is providing, (demonstrated by a drop in support calls from the AOC since the implementation), but also its future potential. Enhanced Airport safety and security Mike Bryant said, “With Situator, we have a platform that we can evolve to positively impact the operations, maintenance, compliance, safety and security throughout our airport. It has opened up possibilities to integrate systems, solve problems and make improvements, without needing to make further investments in standalone solutions.” Rupen Philloura concludes, “Every airport needs a robust, reliable and easy to use logging solution and for MIA it is one of the greatest strengths of Situator. It gives us complete situational awareness regarding when and how an event transpired, who responded, how, and the result. This insight improves our decision-making and feeds a continual cycle of improvement.”
The Security Industry Association (SIA) has announced the 2021 winners of the SIA New Product Showcase Awards, the flagship awards program presented in partnership with ISC West recognizing innovative security products, services, and solutions. Top among the winners – who were recognized June 17 during a virtual awards show – was Lumeo, receiving the 2021 Best New Product Award. SIA New Product Showcase Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2021, following significant deliberations, the 35 judges presented awards for technologies covering 25+ product and service categories. The 2021 SIA New Product Showcase entries will be on display July 19-21 in Booth 14073 on the ISC West show floor. Best new product Lumeo received the Best New Product honor for its Lumeo product, submitted in the Emerging Technologies category. Lumeo received the Best New Product honor for its no-code video analytic builder “Lumeo is the first and only ‘no-code' video analytic builder that provides integrators, software vendors, and solution providers with the ability to create and deliver custom analytics in minutes and with no technical skills needed,” said Lumeo. “Using drag-and-drop tools, pre-built analytic building blocks, and AI models, Lumeo lets providers instantly add AI-powered analytics to their own solution, or extend existing VMS and camera installations to increase revenue and bottom line. Lumeo’s cloud-managed analytics can run in the cloud, on-premises, or a hybrid model so you can optimize for convenience or cost.” Judges’ Choice Award The prestigious Judges’ Choice Award was presented to Teleportivity for the QR Video Intercom product, submitted in the Emerging Technologies category. “Imagine being able to install an app-like ‘video intercom’ experience, anywhere, simply with a QR code,” said Teleportivity. “There’s no hardware needed, and no app required for the visitor. Simply scan with a smartphone and access. Intercom owners can add a whole range of other self-serve experiences into their code. Install onto a digital directory, letterbox, a door, a wall…Anywhere.” New ideas and technologies “The 2021 entrants to the SIA New Product Showcase are a remarkable group, and we were impressed by the many notable ideas and new technologies that came in this year,” said Christopher Grniet, chair of the SIA New Product Showcase Committee. “It was a challenge making the final award determinations in this year’s highly competitive program following hours of panel-driven judging and technology demonstrations. Thank you to our dedicated judges for volunteering your time, expertise, and efforts to make the 2021 SIA New Product Showcase a success.” Merit Award SIA New Product Showcase program – received the New Product Showcase Merit Award Additionally, Marc R. Tardiff – founder of MRT Security Consulting LLC and an active volunteer judge in the SIA New Product Showcase program – received the New Product Showcase Merit Award, which recognizes an individual or company who, through their support of the New Product Showcase, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. “I am honored to be named the 2021 SIA NPS Merit Award winner and would like to thank Sandra Jones, who first gave me the chance to serve on the SIA NPS Committee, as well as SIA, Reed, and our NPS Committee members for the work that has been going on for quite some time,” said Tardiff. “I’d also like to thank our previous chair, Jennifer Martin, and current chair Chris Grniet for allowing me to continue to serve.” Recognizing all the honorees “SIA is thrilled to recognize the 2021 SIA New Product Showcase honorees, whose products, services, and contributions represent the most innovative new security offerings on the market,” said SIA CEO Don Erickson. “SIA congratulates all the 2021 award winners, and especially Lumeo and Teleportivity, whose solutions stood out among the impressive field of entrants to earn the Best New Product and Judges’ Choice honors. Additionally, we congratulate Marc R. Tardiff on being named the 2021 SIA NPS Merit Award recipient in recognition of his dedication and valuable contributions to this flagship awards program.” Winners of the 2021 Product Showcase The 2021 SIA New Product Showcase award winners are: Best New Product Award Winner: Lumeo – Lumeo Judges’ Choice Award Winner: Teleportivity – QR Video Intercom New Product Showcase Merit Award Winner: Marc R. Tardiff, founder, MRT Security Consulting LLC Category Awards Access Control Devices & Peripherals Hardware – Wireless Winner: Master Lock – Master Lock Vault Enterprise Bluetooth Door Controller Honorable Mention: Bird Home Automation GmbH – DoorBird D1812 Access Control Software, Hardware, Devices & Peripherals – Wired Winner: Honeywell International Inc – Pro-Watch Integrated Security Suite Honorable Mention: Alvarado from dormakaba Group – MST-TE Touch-Free Full Height Turnstile Anti-Terrorism/Force Protection Winner: Bullistic Barriers LLC – RaDeBuRe Commercial Monitoring Solutions Winner: Evolon – Verify Honorable Mention: Optex – Optex 12 Channel Bridge Communications and Networking Solutions Winner: M2M Services – MINI-LTE-M-AV Convergence and Integration Solutions Winner: BioConnect – BioConnect Enterprise 5.0 Design, Diagnostic, and Installation Tools Winner: Axis Communications, Inc. – AXIS Plugin for Autodesk Revit Emerging Technologies Winner: Teleportivity – QR Video Intercom Honorable Mention: Lumeo – Lumeo AiP Monitoring – SafeAtHome App Environmental Monitoring Systems Winner: IPVideo Corporation – HALO 2.2 Fire/Life Safety Winner: NOTIFIER by Honeywell – Notifier Inspire Self-Test Smoke Detection Hosted Solutions/Managed Services Winner: Soloinsight Inc. – CloudGate SmartSpace Identification Management and Credentialing (Non-Biometrics) Winner: SISCO – ThermalPass Intrusion Detection and Prevention Solutions (Physical) – Wired Winner: OPTEX Inc. – Redscan Pro Intrusion Detection and Prevention Solutions (Physical) – Wireless Winner: Intelligent Automation, Inc. – ARGUS Perimeter Security Solutions Key/Equipment Assets Management Solutions Winner: CyberLock Inc. – CyberAudit-Web 9.4 Law Enforcement/Public Safety/Guarding Systems Winner: Active Guardian – 3xLOGIC Gunshot Detection Lock and Key Solutions Winner: Medeco Security Locks – Medeco 4 High-Security Key System Cellphone Solutions (Connected) Winner: IronYun Inc. – Vaidio Cam App Smart Home Solutions Winner: Alarm.com – Flex IO Honorable Mention: 2GIG – 2GIG EDGE Security and Automation Panel Threat/Risk Management Software Applications Winner: Gallagher – Proximity and Contact Tracing Report Video Analytics Winner: IronYun Inc. – Vaidio AI Vision Platform 5.0 Video Surveillance Cameras (HD/Megapixel) Winner: Hitachi Kokusai Electric, Ltd. – KP-HD3005G-R5/IF-PCB Video Surveillance Data Storage Winner: Premio Inc. – AI Edge Inference Computer (RCO-6141E-4U2C-2060S) Video Surveillance Management Systems Winner: Immervision Inc. – Immervision HTML 5 Web SDK During the 2021 SIA New Product Showcase virtual awards ceremony, in addition to the presentation of the overall and category-specific awards, attendees enjoyed hearing insights from New Product Showcase judges into innovations driving product advancements in the security industry. The 2021 SIA New Product Showcase entries will be on display July 19-21 in Booth 14073 on the ISC West show floor.
Harris County, Texas, the third most populous county in the U.S., is deploying a new, next-generation security system in its buildings that will help make them more efficient and easier to operate. The new Honeywell system replaces multiple, disparate systems by integrating access control, security cameras, alarms and monitoring across the county's nearly 150 buildings situated over 1,777 square miles in Houston and the surrounding areas. Streamlined security platform Texas-based security integrator, ESI Fire and Security Protection, worked with Harris County to identify its needs and implement a streamlined security platform, using Honeywell's Pro-Watch Intelligent Command security management system to network video recorders, video cameras, thermal readers, and thermal cameras. The new system provides detailed, real-time information about alarm events, access and safety across the county The new system provides detailed, real-time information about alarm events, access and safety across the county. “The security and well-being of the Harris County employees, visitors and residents is always a top priority.” said Retired Major Gen. Rick Noriega, Interim Executive Director, Harris County Universal Services. Pro-Watch Intelligent Command system Rick adds, “This project allowed us to improve our systems and gain better insights into the county's buildings to provide a safer environment. The solutions provided by Honeywell and ESI also better set the county up for the future – we can test and actively add technologies to address new needs with this flexible but scalable system.” Before Honeywell's Pro-Watch Intelligent Command system, each county building used different security products that didn't talk to one another, creating an overly complicated network and increased work for employees. Immediate benefits for Harris County will include: Saving taxpayer dollars through better analytics that reduce false alarms and help first responders. Monitoring from a single central control station for improved situational awareness. Creating healthier building environments by leveraging people-counting technologies and analytics to manage health and safety compliance, such as social distancing. Streamlining systems to create operational efficiencies and save the county resources that can be redirected to other critical infrastructure or services. IDEMIA biometrics solutions Harris County Universal Services is looking into deploying next-level biometrics solutions from IDEMIA to enhance access control at the courthouse. Using facial recognition, a camera mounted on the entrance turnstiles will recognize employees and frequent visitors, such as judges and lawyers, using data stored in the ProWatch system without the need to physically scan a badge or remove facial coverings. This frictionless access system will allow employees and visitors to enter the building in an efficient and secure manner. This system can also alert a precinct when a public park is reaching capacity and monitor building occupancy levels to comply with local health regulations. Harris County is actively testing and implementing new features that will add additional capabilities countywide. The upgrades are designed to proactively manage situations and respond faster when required. Enhancing intelligence and transparency Harris County lacked a holistic, real-time view into its various facilities with its previous systems" “Harris County lacked a holistic, real-time view into its various facilities with its previous systems,” said James Humbert, Business Development Manager at ESI Fire and Security Protection. James adds, “We've partnered with the county and Honeywell to create positive change in just about every way the county operates by improving intelligence and transparency, reducing response times and helping to save taxpayers' dollars. We look forward to continuing to work with Harris County and Honeywell in creating an efficient and safe environment for residents and employees that is ready for the future.” Fully customized solution “Through a collaborative effort with the county and ESI teams, we created a more efficient and safer environment for people who work and visit Harris County public buildings,” said Rick Koscinski, General Manager, North America, Honeywell Commercial Security. Rick adds, “With a county as large as Harris County, it was no surprise that they had multiple, disconnected systems put in place over the years which limited efficiency and connectedness. Now, the county has a fully customized solution that is built to evolve with its needs that will not only help increase safety and awareness but also create an improved building experience for its employees and building visitors.” With a population of nearly five million people, Harris County employs more than 15,000 workers to support its residents with services including public safety, jails, law enforcement, courts, library services, and licensing facilities. Harris County Universal Services Harris County Universal Services is the solutions center for the departments and offices of Harris County. It designs, implements, and maintains high-quality, innovative, and cost-effective technology products and services for its customers. It provides comprehensive support through eight consumer divisions: Business Applications, Business Operations, Customer Service, Cyber Security, Fleet Services, Information Technology Infrastructure, Program Delivery & Analytics, and Public Safety Technology.
Related white papers
School Security Moves to the Cloud
Cloud-based Access Control And Occupancy Management To Safeguard Workplaces
Wireless Access Control eBook
Smart And Reliable Rail And Metro OperationsDownload
5 Ways RFID Readers Can Secure Your WorkplaceDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
- Matrix Provides Comprehensive People Mobility Solution To Ministry Of Finance, Indonesia
- Dahua Intelligent Residential Solution Deployed In Hyde Park Residential Complex In Kazakhstan
- Anviz Provides Contactless Facial Recognition Time And Attendance Solution To Enhance Biometric Security At Evertis
- Miami International Airport Upgrades Its Incident Logging System To Qognify’s Situator Enterprise Incident Management System