Intercom Systems - Expert commentary

Building Security: How Audio Tells the Whole Story
Building Security: How Audio Tells the Whole Story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter?   Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds.  Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents.  Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open.  COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service.  The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.  

Thermal screening: The Technology That Will Lead Us Out of Lockdown
Thermal screening: The Technology That Will Lead Us Out of Lockdown

Across the world, the impact of the current pandemic has majorly disrupted how we function in our everyday lives, as a society, and the ways in which we do our jobs. Throughout, our personal safety and wellbeing, as well as that of our families, neighbours and colleagues, has been paramount - and adapting our day-to-day lives to meet social distancing measures has been a learning curve for us all. As we start to reassemble normal life, precautionary measures will continue to be put in place to achieve the universal aim of mitigating the spread of the virus as much as possible. As different countries reach new stages of this process, some parts of the world continue to live and work in lockdown, while some are beginning to open up. This means governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection as more people begin to return to the outside world. Tracing the spread of COVID-19 Of course, this will need to be driven by higher-level support from leaders in government, healthcare and technology to develop innovative ways of tracking and tracing the spread of COVID-19. From contact tracing solutions, to self-reporting apps and thermal screening cameras – governments and businesses across Europe have a new responsibility to seek and reinforce the most effective ways to ensure people’s safety. These measures are particularly pertinent to those reopening their doors as lockdown eases, and those returning to a daily routine of commuting to and serviced office spaces. As more and more people begin to move through public and commercial areas, we will rely more on technology to run in the background to ensure safety and wellbeing is monitored - much like that of the everyday CCTV camera. Thermal temperature screening cameras One piece of technology that we can expect to see as more commonplace is the thermal temperature screening cameras and monitoring system. An example of this kind of device, is D-Link’s recently launched all-in-one, intelligent fever screening kit – which includes a dual-lens thermographic camera, blackbody calibrator, as well as integrated management software. Governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection The premise of temperature screening cameras like this one, is to harness thermal imaging technology coupling it with AI to identify if a person is experiencing elevated temperatures, and raise the alarm automatically when someone at risk of spreading is detected. To monitor the progression or depletion of COVID-19, technologies such as AI facial recognition will play an important role in mitigating the risks of the virus spreading. Thermal cameras that use AI can easily capture and manage employee’s temperature and stop their entrance if a fever is detected. For this reason, such devices are normally installed in a doorway or entrance to a building to quickly detect and identify those displaying symptoms before entering a building. This type of surveillance will be detrimental to the management of COVID-19 in the world of a ‘new normal’ – as companies feel their way out and learn as they go along with people’s health and wellbeing continuing to be center of the mind. Just as lockdown has had an impact on physical as well as mental health, so too will the adjustment to living life post-pandemic. Not only in getting used to and dealing with the emotional and mental pressures of life on the ‘outside’ as they leave lockdown, but they also face the very real risk of contracting the virus and the worries they may have of spreading it. Appropriate installation of temperature screening Companies and organizations have a responsibility in these times to play a supportive role towards employees, such as allowing them to continue working from home until they feel comfortable to work in an office setting. Equally, as restrictions ease, employers have a duty to make the workplace a safe place that is able to uphold the wellbeing of staff, which is where, as we wait for a vaccine, we must make use of the available technology. However, in the case of the thermal camera, in order for it to deliver effective results, it must be installed appropriately. To support this, we have outlined some key points to consider when deploying a temperature screening camera here: Choose a solution that features a blackbody calibrator – a vital part for any temperature screening device. A blackbody calibrator is the basis for accurate calibration of infrared thermography devices and allows the device to accurately detect a fever. Check for facing windows or doorways and heat sources such as radiators as these increase the risk of stray heat or cold sources throwing off readings according to the ISO standard associated with this type of equipment Be wary of weather and changes in climate as the device will need time to acclimatise – in order for readings to be clear individuals coming in from outside must wait five minutes before being screened When mounted, the camera must face individuals head-on and in parallel with their face to capture the inner eye area which is crucial for temperature reading Consider an option using AI which will automatically recognize individuals based on photos in the system Check applicability and legality of temperature screening cameras before deploying There’s a long way to go before life will fully return to normal. In the meantime, and to help everyone along the way, it’s essential that the right measures are in place to protect the physical and mental wellbeing of those we are responsible for. For anyone who is exploring options, know that there is help out there to provide guidance and expertise on the solutions that will be right for you and your business - now, as we go through the remainder of lockdown, and as we slowly move back into everyday lives.

The Digital Transformation Of Modern Access Control Solutions
The Digital Transformation Of Modern Access Control Solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Latest Keyscan Inc. news

Altronix Showcases Trove Access And Power Integration Solutions At ISC West 2018
Altronix Showcases Trove Access And Power Integration Solutions At ISC West 2018

Altronix, a manufacturer of power and data transmission products for the professional security industry, is showcasing a host of new Trove Access and Power Integration Solutions here at ISC West 2018 (booth #11073). Trove easily combines Altronix power with access controllers from the industry’s leading manufacturers. DMP, ProdataKey (PDK), Sielox, and ZKTeco USA now join Altronix’s extensive list of access control manufacturers to capitalize on the benefits that Trove solutions deliver. “Trove is engineered to help system designers easily layout power supplies, access controllers and accessories in an organized streamlined manner, which saves time, reduces costs and conserves valuable space,” said Alan Forman, President, Altronix Corporation. “We are pleased to collaborate with the industry’s leading access manufacturers, increasing ROI and providing value-added features for our mutual customers.”Removable backplanes designed for specific access control brands allow installers to easily configure and test system configurations Simplifying Security Deployments Trove Access and Power Integration Solutions simplify board layout and wire management, while providing extreme flexibility and scalability when designing and deploying access systems. Removable backplanes designed for specific access control brands allow installers to easily configure and test system configurations prior to on-site installation, reducing time and labour and increasing profitability. In addition to the Trove1 and Trove2 Series, Altronix introduced Trove3 for the largest access control deployments. Altronix Trove now supports over 40 brands, including: AMAG, Bosch, CDVI, DMP, Genetec, HID, Honeywell, Kantech, Keyscan, Lenel, Mercury, ProdataKey (PDK), Sielox, Software House and ZKTeco USA with more to come. Trove enclosures include a cam lock, tamper switch, mounting hardware, and provide ample room to accommodate back-up batteries. Altronix also offers a free Trove System Design Tool to further simplify the product selection and design process.

Altronix Demonstrates Trove Access And Power Integration Solutions At ASIS 2017
Altronix Demonstrates Trove Access And Power Integration Solutions At ASIS 2017

Altronix, a recognized provider of power and transmission solutions for the professional security industry, is featuring its expanded offering of Trove Access and Power Integration Solutions at ASIS 2017 (booth # 2823). New additions to the Trove series include Altronix integrations with Bosch, DMP, Honeywell, Kantech and Sielox access. These new models join the versatile line of Trove solutions which accommodate AMAG, CDVI, HID/Vertx, KABA/KeyScan, Mercury and Software House access controllers. “Trove enclosures and backplanes simplify board layout and wire management, greatly reducing installation and labor costs, while providing the versatility and scalability that system designers and installers require to easily configure their systems.” said Alan Forman, President, Altronix Corporation. Enhanced Performance Efficiency Trove2 Access and Power Integration Solutions are designed for larger applications, allowing Altronix power/accessories combined with access controllers from the industry’s leading manfacturers to be wired and pre-tested prior to on-site installation. This reduces total cost and enhances performance efficiency. Altronix also offers the Trove1 Access and Power Integration Solution, a more compact version of the Trove2 for smaller applications which accommodate CDVI, HID/VertX and Mercury access controllers. All Trove enclosures include a cam lock, tamper switch and mounting hardware. Altronix has further simplified the product selection and configuration process by offering a free online Trove System Design Tool for configuring a access system.

BioConnect And Suprema To Showcase Biometrics, Security And Identity Innovations At ISC West 2017
BioConnect And Suprema To Showcase Biometrics, Security And Identity Innovations At ISC West 2017

The new FaceStation 2 is a contactless facial recognition device with an adjustable wall bracket  BioConnect and Suprema will be at ISC West 2017 demonstrating the newest innovations in biometrics, security and identity in booth no. 22075. New facial recognition, dual-factor cabinet lock, cybersecurity and mobile solutions will be demonstrated in the joint booth.  With cybersecurity issues seemingly ever-more prevalent and the development of more user-friendly security solutions such as mobile and contactless biometric, security professionals are consistently seeking ways to protect both physical and logical applications. BioConnect and Suprema are pleased to address these issues with a focus on biometrics, security and identity at ISC West 2017 and invite security professionals to learn more. Suprema FaceStation 2 Suprema will debut the new FaceStation 2, a facial recognition device with multi-card support. The FaceStation 2 is the next generation of the FaceStation and as a contactless facial recognition device with an adjustable wall bracket to accommodate different heights, it is very user friendly. It boasts an incredibly fast and accurate matching speed (1:3,000 matches in one second) and captures both static and dynamic templates, giving it the ability to constantly evolve and sustain a more exact understanding of the daily changing expressions of the face. The device also offers multi-factor authentication options with a RF card (HID Seos, iClass, Prox) and PIN. It also can operate in much harsher lighting conditions than other competing facial recognition devices with an operating illuminance of up to 25,000 lux.  BioConnect ID CabinetShield BioConnect ID is at the core of every biometric service offered by BioConnect and simplifiesthe deployment of biometrics BioConnect colocation customers expressed the need to provide dual-factor authentication from the front door all the way to the cabinet to address both compliance and their customer security requirements. In the past, solutions to meet these requirements at the server cabinet were limited. To address this problem, BioConnect created BioConnect ID CabinetShield a dual-factor fingerprint plus card lock to secure server cabinets. With biometric (fingerprint) and card support, the lock is manufactured to fit most of the common cabinets and can be easily integrated with over 25 various access control solutions, making installation and enrolment much more simple and sustainable. The BioConnect team has completed multiple successful pilots of the solution in flagship data centers across North America. BioConnect ID Mobile xWith companies going global in footprint and supporting a workforce that is more mobile than ever, BioConnect’s partners are fast-developing solutions where mobile credentials are replacing plastic cards. BioConnect ID is at the core of every biometric service offered by BioConnect and simplifies the deployment of biometrics. BioConnect will debut BioConnect ID in the form of an API/SDK and mobile app to enable enterprises to take advantage of biometrics (face, voice, fingerprint, eyeprint) within their mobile app. BioConnect will be demonstrating partner mobile apps that are secured by BioConnect ID.  Suprema and BioConnect are consistently updating theirbiometric offerings to support evolving industry standards BioConnect ID Cybershield BioConnect and Suprema are very excited to debut BioConnect ID Cybershield, a complete end-to-end physical security solution that meets IT requirements. BioConnect ID Cybershield incorporates Suprema BioStation 2 fingerprint plus card access device integrated with leading access control solutions. It boasts software customisations that meet the requirements of network security, from how the device communicates to the panel, to the network, how the data is stored and can even support an enterprise transitioning to newer network protocols such as 802.1x and IPv6. The solution will be demonstrated with Software House CCURE 9000 access control.  BioConnect ID Enterprise BioConnect is consistently integrating the leading biometric solutions on the market to offer flexibility to grow in the future. BioConnect and Suprema will demonstrate how Suprema devices and BioConnect ID CabinetShield seamlessly integrate with Lenel OnGuard, Brivo OnAir, AMAG Symmetry, Genetec Security Center and Keyscan Aurora access control solutions with BioConnect ID Enterprise.  Suprema and BioConnect are also consistently updating their biometric offerings to support evolving industry standards such as communication protocols (such as OSDP) and card types such as HID iClass and SEOS. BioConnect and Suprema are looking forward to meeting with security professionals at ISC West. Attendees can request a meeting on BioConnect’s website or visit booth no. 22075 to see the latest biometric solutions on the market. 

Related white papers

5 Reasons To Integrate Mobile Technology Into Your Security Solution

RFID and Smartphone Readers in Physical Access Control

The Role Of IT In Physical Access Control