Access control systems & kits - Expert commentary

Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center
Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center

Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.

Biometrics Provides Industries With Security, Access Control And Data Protection
Biometrics Provides Industries With Security, Access Control And Data Protection

Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.

Physical Security in 2021: Post-Pandemic Solutions
Physical Security in 2021: Post-Pandemic Solutions

In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organizations are still engaged primarily in “anywhere operations”, i.e. remote work, many organizations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organizations that have returned to in-person work.  But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organization will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organizations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organizations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.

Latest HID Global news

Genetec Employed By Retail Powerhouse The Very Group To Safeguard Its New Purpose-Built Fulfilment Center
Genetec Employed By Retail Powerhouse The Very Group To Safeguard Its New Purpose-Built Fulfilment Center

The Very Group is the UK’s largest integrated digital retailer and financial services provider. It offers 1,900 brands to its four million customers. Due to the company’s growth, it built a new state-of-the-art fulfilment center - close to one million square feet - to centralize operations and drive efficiency. The Very Group has historically operated from three fulfilment centers in the north of England. Due to the business’ growth, it needed a new, purpose-built and automated facility in a central, well connected location; that could accommodate all one-man fulfilment and returns operations on one site, and that provided room for continued expansion. The space offered by the new site in the East Midlands means that The Very Group can process more orders and use new technology to make the business more responsive, reducing the time it takes to get products to customers. Support business growth The site’s position in the East Midlands, adjacent to the M1 and East Midlands Airport, with its own rail freight terminal, will enable the business to increase its cut-off time for next day delivery to midnight from 7pm, and explore the introduction of same day delivery in the future. A crucial aspect of the new hub was security - with the need to not only secure the site and the stock inside, but implement solutions which would benefit the wider business too. The Very Group required a platform which could provide the business-wide value it was seeking The Very Group required a platform which could unite operations and provide the business-wide value it was seeking. The company approached Grantfen, initially on a consultancy basis, to guide the organization on the route it should be taking and the technologies that could support its ambition. Grantfen quickly recognized the scope of The Very Group’s ambitions for a platform that was easy-to-use and that could bring together information from hundreds of different sensors and technologies. Incorporating video surveillance It put forward a comprehensive solution built on the Genetec Security Center unified platform. Incorporating video surveillance and analytics, access control, automatic number plate recognition and integration with other key business systems, this allowed The Very Group to deploy best of breed technologies from a range of vendors including HID Global, Axis Communications and SenStar. Perhaps the most important solution needed was tracking who was coming in and out of the building - with such a large workforce, combined with inbound and outbound deliveries, the facility has hundreds of people inside at any one time. Previously, security manually searched people selected at random. However, thanks to the robust Genetec software development kit, and Grantfen’s specialist development expertise, The Very Group has been able to adapt the solution and write its own code in order to use the access control system to implement truly random searches. Number plate recognition This has involved getting permission to hold employee data, but again, thanks to the new system brought together by Security Center, the data is housed safely. Moving from three fulfilment centers into one, consolidated facility meant a change in operations for The Very Group, and security needed to mirror this evolution. Therefore, with the volume of traffic coming in and out of the site increasing, The Very Group implemented automatic number plate recognition (ANPR). Heavy goods vehicles could be monitored coming in and out of the site, enabling those in the diary to enter and exit the grounds in an efficient manner. Plus, with timestamps now able to show when vehicles entered or exited the grounds, it helped with yard management and traffic flow, with Security Center able to generate reports on how traffic is moving around the yard. Employees are able to take advantage too - with the ANPR recognizing them and seamlessly letting them into the parking lot. Health and safety standards The opening of Skygate, our new fulfilment center, means a new era for the group" This enhanced integration has benefitted other areas of the business too. The CCTV control room is now able to monitor fulfilment center flow, looking at movements such as trailers, to help maximize efficiencies and ensure high health and safety standards. Dean Cooper, Head of Security at The Very Group, commented: “The opening of Skygate, our new fulfilment center, means a new era for the group. We are a digitally-led business, and the fact we are now able to enhance operations and yield more value from security functions is going to help us operationally. Genetec and Grantfen have played a huge part in accelerating our sophistication in this area, and I look forward to how we can gain increasing insights from all the technology has to offer.” Deep integration and analytics While the roll-out has been relatively recent, the positive effects are already being felt across the business. This has led to future plans about what else could be introduced - all underpinned by Genetec Security Center. “Genetec Security Center is helping to improve inter-departmental collaboration thanks to its reporting functions, alongside benefiting operations and ensuring the security of the facility. We are an ambitious business, and as we grow we need a system that will continue to evolve with our requirements. Genetec enables this, and alongside its deep integration and leading analytics, we look forward to continuing the partnership over years to come”, concluded Cooper.

HID Global Announces Release Of Its HID SAFE Physical Identity And Access Management Solution For Hybrid Workplaces
HID Global Announces Release Of Its HID SAFE Physical Identity And Access Management Solution For Hybrid Workplaces

As businesses move to hybrid remote and in-person workplaces while complying with evolving public-health mandates, they must manage a dynamic enterprise environment with more complex safety and security challenges. HID SAFE Facility and Risk Analytics HID Global, a globally renowned company in trusted identity solutions, has announced its HID SAFE Facility and Risk Analytics solution that improves efficiency, agility and flexibility in hybrid workplaces through real-time occupancy monitoring, risk analytics and alerting, and reporting. HID Global has seamlessly integrated the Innominds AI-powered iFusion technology into its HID SAFE Facility and Risk Analytics solution so users can create an easy-to-understand risk score based on real-time and historical behavior patterns. Integration with Innominds AI-powered iFusion technology The solution uses artificial intelligence to compare workplace data from physical security systems to archived information about past access control events, including unauthorized activities. This provides a clear picture of emerging threat scenarios so as to enable organizations to diagnose and resolve security risks effectively. “The ability to identify patterns of behavior that highlight risk is critical for businesses that increasingly are adopting a hybrid work model with more complex risks and compliance needs,” said Julian Lovelock, Segment Vice President at HID Global, adding “Innominds' iFusion’s deep predictive analytics capabilities and its integration with HID Global’s physical identity management solutions are designed to ensure a secure enterprise work force environment thus enabling enterprises to embrace the new normal.” iFusion analytics technology iFusion analytics technology uses Innominds’ proprietary accelerators to generate deep insights iFusion analytics technology uses Innominds’ proprietary accelerators to generate deep insights, predictive analytics and real-time reporting from complex data. The technology enables HID SAFE solution users to predict security events so they can improve the effectiveness, efficiency, and cost of their security operations. “We are pleased with this possibility of supporting enterprises’ return to work with solutions built on our AI, analytics and data engineering expertise. We are thrilled to be collaborating with HID Global who are leveraging our proprietary accelerators and AI-driven analytics platforms such as iFusion,” said Krishna Guda, President and Chief Strategy Officer, Innominds. Hybrid work solutions Krishna adds, “Our joint vision to offer a secure back-to-work solution for future enterprises becomes a reality with this collaboration. This strengthens our endeavor to power the Digital Next initiatives of global companies and be at the frontiers of the future of work.” In a recent HID survey, almost 70 percent of customers said the future of work will be hybrid. With the HID and Innominds collaboration, customers now have the deep insights, predictive analytics, and real time reporting to rapidly diagnose and resolve threatening situations while also meeting evolving compliance requirements in the new hybrid work environments.

HID Global Equips Bay State College With Its Digitized Contact Tracing Solution With HID Bluetooth BEEKs Beacons
HID Global Equips Bay State College With Its Digitized Contact Tracing Solution With HID Bluetooth BEEKs Beacons

HID Global, the globally renowned company in trusted identity solutions, has announced that Bay State College safely brought its students back to its campuses in Boston and Taunton, Massachusetts using a digitized contact tracing solution that includes HID Bluetooth BEEKs Beacons to provide real-time location services. HID Bluetooth beacon The HID Bluetooth beacon is in the form of a simple badge holder that is used to carry existing ID badges for students, faculty, staff and guests. The beacons are part of a robust solution that makes it possible to quickly and easily perform contact tracing, removing the manual and time-consuming effort to identify who has been in contact with whom on campus. “Contact tracing is a key component for safely operating our campuses and considered by health departments to be one of the most important efforts to help slow the spread of COVID-19,” said Jeffrey E. Myers, Chief Information Officer with Bay State College. Contact tracing solution He adds, “HID BEEKS beacons are carried by each person on campus as part of our solution that enabled us to safely resume in-person classes and keep our campus operational should isolated parts of our community find themselves infected.” The HID BEEKS Bluetooth Low-Energy (BLE) beacons provide the starting data that Bay State College’s contact tracing solution uses to calculate the time, place, and proximity of faculty, staff, and students while on the college’s two campuses. HID BEEKs Beacons HID’s offering is part of a broader platform that provides smart building and optimization capabilities" The information from the beacons enables college administrators to comply with state and local occupancy mandates and, when needed, rapidly respond to cases. Logs are maintained only for the 14-day period required for contact tracing, and the university has adopted strict privacy policy guidelines for data use and access. “We are very pleased that Bay State College has used HID BEEKs Beacons to help streamline and accelerate the often daunting task of contact tracing,” said Mark Robinton, Vice President of IoT Services at HID Global, adding "In addition to creating a completely digitized approach to this process, HID’s offering is part of a broader platform that provides smart building and optimization capabilities that extend well beyond today’s pressing need to stem the spread of COVID-19.” HID Location Services HID BEEKS Beacons are part of a complete HID Location Services for Workplace Safety that also simplifies and streamlines how to manage social distancing. These workplace safety solutions build on the company’s comprehensive HID Location Services platform, deployed by Fortune 500 companies worldwide, to manage building occupancy, optimize office and facility space, improve energy efficiency and enhance security. The platform can also monitor assets as well as the condition and health of industrial equipment.

Related white papers

Physical Access Control In Higher Education

11 Considerations For Embedded System RFID Readers

Beyond Security - Access Control For Multi-Tenant Sites