Browse Access Controllers

Access control controllers - Expert commentary

The Intersection Of Education And Fire And Security
The Intersection Of Education And Fire And Security

Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education.  Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.

How To Build An Insider Threat Program
How To Build An Insider Threat Program

Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.

The Benefits Of An Integrated Security System
The Benefits Of An Integrated Security System

Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.

Latest ASSA ABLOY news

Easy Student Chooses SMARTair Wireless Access Control For New Student Residence, France
Easy Student Chooses SMARTair Wireless Access Control For New Student Residence, France

Student accommodation is a fast-growing sector. Student numbers across France have grown around 10 percent in a decade. Around $1 billion was invested in France’s purpose-built student accommodation just between 2016 and 2018. Efficient solutions to help manage security for these student properties are always welcome. For new premises in Rennes, France, specialist provider Easy Student sought reliable, key-free locking. They wanted their new residence to run efficiently, “like a hotel,” and without the unnecessary workload that comes with managing and keeping track of physical keys. SMARTair Wall Readers Wireless Electronic Escutcheons with inbuilt RFID readers control access through 83 doors at Easy Student Rennes Following a positive experience with the same technology in Nantes, Easy Student chose SMARTair Update on Card wireless access control. Wireless Electronic Escutcheons with inbuilt RFID readers control access through 83 doors at Easy Student Rennes. SMARTair Wall Readers secure non-standard entrances. SMARTair’s TS1000 software was one major reason for Easy Student’s choice. The intuitive interface and time-saving functionality make it easy for administrators to manage their access system. “SMARTair does not require any technical knowledge. I trained quickly and found the software very easy,” says Cyril Verger, Managing Director at Easy Student Rennes. “The solution corresponds perfectly to our needs. Installation was simple.” If someone loses a credential, the TS1000 interface makes cancelling it fast and easy, a major change from the old days of physical keys, mechanical locks and key organization charts. “A lost key can still be used,” M. Verger adds. “A lost credential can be canceled easily.” Flexible door entry It gives Easy Student managers the ability to change a user’s access permissions anytime, without visiting the doors SMARTair provides secure, flexible access control for every student, service provider and facilities manager who uses the residence. Around 100 access credentials are active at any one time. It gives Easy Student managers the ability to change a user’s access permissions anytime, without visiting the doors. If an incident occurs, they act quickly and decisively. Security managers program every student credential to open multiple doors: the student’s own room, the main door and bike park around the clock; a common relaxation area and the laundry room between 6.30am and 11.30pm only. “Managing this way avoids comings and goings by people who don’t live here,” M. Verger says. “Our students are very happy with the solution,” he adds. “They got used to it quickly, because this type of access control is found in lots of hotels and private homes. I highly recommend installing SMARTair at other student residences.”

ISC West 2020: ASSA ABLOY To Be Honoured By SIA For Contributions To The Security Industry At The Advance 2020
ISC West 2020: ASSA ABLOY To Be Honoured By SIA For Contributions To The Security Industry At The Advance 2020

The Security Industry Association (SIA) has named ASSA ABLOY as the recipient of the 2020 Member of the Year Award, which honours SIA member companies that have shown noteworthy involvement in SIA committees and working groups, SIA events and the SIA Education@ISC conference program; leadership activity; recruitment of SIA members; and contributions to SIA thought leadership and the industry overall. SIA will present ASSA ABLOY with the award at The Advance, SIA’s annual membership meeting, during ISC West. ASSA ABLOY – the global provider of access solutions – is a long-time SIA corporate member that takes an active role in participating in SIA’s array of programs, products and services and fully supports its employees’ involvement in SIA committees, working groups and advisory boards. The company is a regular sponsor of key SIA events, including the Market Leaders Reception at ISC West, SIA GovSummit and Securing New Ground. On-demand training courses SIA is proud to honor ASSA ABLOY as the 2020 SIA Member of the Year and applauds the company for its invaluable engagement “SIA is proud to honor ASSA ABLOY as the 2020 SIA Member of the Year and applauds the company for its invaluable engagement, thought leadership efforts and contributions to SIA, our members and the security industry overall,” said Scott Schafer, Chairman of the SIA Board of Directors. “Thanks in large part to the outstanding support of members like ASSA ABLOY, SIA is able to continue building on its robust suite of resources, programming and education and training offerings to better serve our members and the industry.” ASSA ABLOY is a contributing member to the SIA Center of Excellence, SIA’s online repository of vendor-neutral, vetted information – including on-demand training courses, e-learning modules, articles and webinars – to foster industry knowledge and help organizations keep at the forefront of market demands. Significant resources and services Additionally, the company has contributed content to SIA Technology Insights, SIA’s journal distilling the most current thinking for applying today’s security technologies and moderated webinars in partnership with SIA and Security Systems News, and ASSA ABLOY executives have spoken at SIA events including Securing New Ground. “ASSA ABLOY is honored to receive SIA’s Member of the Year Award. Since serving on the SIA Board of Directors, my eyes have been opened to the significant resources and services provided by the SIA management team and staff under the leadership of Don Erickson and Scott Schafer,” said Martin Huddart, Head of Smart Residential for ASSA ABLOY. Vast network of member volunteers The Advance will take place during ISC West 2020 on Tuesday, March 17, from 10:30 to 11:30 a.m" “I have also been impressed by the vast network of member volunteers who work on important committees and support SIA events – I think this is a reflection of the relevance and vitality of this trade association. I’d like to thank not only the ASSA ABLOY volunteers that led to this recognition, but all SIA members who contribute their time to the advancement of security in the workplace and in our homes. We shouldn’t forget that our collective impact makes a real difference in the world.”  The Advance will take place during ISC West 2020 on Tuesday, March 17, from 10:30 to 11:30 a.m. in the Sands Convention Center in Las Vegas, Nevada. Exchange market intelligence In addition to the presentation of the SIA Member of the Year Award, attendees will enjoy a high-impact presentation from William Wilkins, Executive Director of Global Security Operations at Valero Energy Corporation, on the Chief Security Officer framework and key lessons for security professionals. SIA will also review key association business, exchange market intelligence for the year ahead and present the SIA Chairman’s Award, Committee Chair of the Year Award and Sandy Jones Volunteer of the Year Award. Attendees of The Advance will receive complimentary lunch and have the opportunity to network with industry colleagues.

ASSA ABLOY Supplying Security And Safety Solutions To UK’s Railroad Industry
ASSA ABLOY Supplying Security And Safety Solutions To UK’s Railroad Industry

The UK railroad industry has set out its plans for the future of the rail sector, including completion of major projects, clean air policies and a long-term plan for infrastructure renewals and enhancements. With more investment and commitment predicted for the industry, Andy Hewitt, Product Manager for ASSA ABLOY High Security and Safety Group, Rail Products, looks at what is needed to supply the best products and solutions for rail projects. As a Group we have been supplying security and safety solutions to the rail sector for over 100 years and as such we’re aware of the many complexities involved specifying products for rail projects, which are very different to securing a building. Rail Standards for Safety Critical Items Any locking systems or safety products supplied to the railroad industry are classed as ‘safety critical’ items Considerations around ease of use, product quality and wider issues around supplying on-scale and on-time all impact on a project’s delivery, but ultimately safety and security must be the key consideration. Any locking systems or safety products supplied to the railroad industry are classed as ‘safety critical’ items and therefore must conform to specific Rail Standards for Safety Critical Items. In addition, the company supplying these products must be accredited as a safety critical supplier by an independent body. ASSA ABLOY High Security and Safety Group (previously Pickersgill - Kaye) was one of the first companies to be accredited back in 1994 and has remained an accredited supplier ever since. Products supplied for use on rolling stock is by, its very nature safety critical, securing doors that are used daily by the rail users must operate reliably and safely. Security, access and safety needs ASSA ABLOY products are not only supported by the exacting requirements of industry standards but are also backed up by years of experience gained working within the industry and having a detailed knowledge of changes to legislation put in place to protect both the public and the experienced rail staff. The security, access and safety needs on the UK’s railways is constantly changing and therefore products and solutions must continually adapt to meet these needs.  Locking systems in particular are subject to high usage and the dynamics of a moving train, shock and vibration at speeds of up to 140 mph, this must be taken into consideration when designing products for this sector. Prototype locking system An example of how this has developed is in the change from traditional slam door trains where the door could be, and sometimes was, opened when the train was moving at speed, to the replacement of all slam doors with power operated doors. These doors cannot be opened unless the train is stationary and only then when the guard or driver allows. The Group has designed and fitted a prototype locking system that reduces the chances of fingers becoming trapped Another development High Security and Safety Group has been working on is the enhanced safety of Diesel Locomotive driver doors, where previously fingers being trapped was a concern, the new design has significantly reduced this. The Group has designed, manufactured and fitted a prototype locking system that drastically reduces the chances of fingers becoming trapped. The prototype is now in-service undergoing assessment, not only by train drivers, but by the locomotive operators’ safety representatives and the train drivers’ unions. Safety and security Investment is continuing into the UK railroad network, whether that’s on large-scale projects like HS2 or enhancements to existing systems. The products and solutions which ensure the safety and security on these projects, must not only adhere to the relevant safety requirements but should come from suppliers with an established heritage and understanding of the sector. ASSA ABLOY High Security and Safety Group is committed to innovation and quality across all its railroad solutions.