Automated processing takes seconds to complete, rather than wasting minutes and hours, reducing total cost of ownership for the company
Automated procedures reduce manual errors & help meet regulatory requirements

End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe.

Physical security equipment and an effective security team will always be required to keep a building safe. But what about having reliable policies and procedures to enforce operational effectiveness?

Sure, companies can invest in the best electronic security systems and cyber security programmes available, but if their internal policies are outdated and security procedures are dependent on manual processes, how can the overall security program be effective? What if the wrong person gains access to a critical area due to a manual error? How do companies know if their policies, procedures, and command and control activities are enforced 100% of the time? How do they prove it?

To be sure, companies must implement policy-based procedures that reduce manual errors, help meet regulatory requirements and provide proof of compliance for audit requirements in the most efficient way possible.

Improve Onboarding Process

When onboarding a new employee, contractor or visitor, security often manually assigns an access card and grants privileges based on what the employee’s supervisor or guest host directs. Normally that process involves the security team receiving notification via email that a new employee, contractor or visitor needs access privileges. Security calls or emails the area owner to see if the new person should be given access. Security waits for a response. The area owner responds with a yes or no. Security enters that access into the physical security system and then emails the card owner and tells them they have access. The same process is true with ad-hoc adding of areas and single doors inside the facility.

All this manual back and forth leaves a lot of room for errors to occur leaving companies vulnerable. To mitigate risk and decrease vulnerabilities, end users must implement an automated process using software to enforce a predetermined corporate policy when granting access to employees, visitors and contractors. A few simple clicks and an email simplify the process.

The automated process takes
seconds to complete, rather
than wasting minutes and
hours, reducing total cost of
ownership for the company

The requesting party clicks on a link in the software and selects a building and the level of access they would like to acquire for the new employee, contractor or visitor. An email is sent to the door owner, bypassing the security department, and the door owner can approve or reject the request by clicking a link. Upon approval, access is immediately provisioned to the physical access control system. The software also automatically deactivates cards for contractors and visitors with a predetermined expired access time, and the deactivations are provisioned to the security management system.

The automated process takes seconds to complete, rather than wasting minutes and hours, reducing total cost of ownership for the company. Proper and automated procedures are followed that provide an accurate audit trail.

Accurate Auditing Made Easy

At least once a year, sometimes more, companies are required to perform an audit. Normally, the security department runs a report for every door and emails the report to the door owners. The owner's review the report, going through it carefully to see if those who have access should have access. People are confirmed or removed and the report is returned to the security department after a month.

If an audit is performed once a year, the data provided in the report could be one to 364 days old, imposing a serious risk that individuals may have access to doors they should not over that timeframe. After that month, the reports are emailed back to the security department where staff must manually go into the physical security system and remove those flagged from the software. For a 1,000 door system, that is months of manual labor while exposing the company and its employees to potentially dangerous high levels of security risk.

"Organizations that require quarterly audits realize diminished risk even more and save more money", says Jeff LeBlanc, VP - Client Services, AMAG

When an organization aligns their security processes with business operations using policy- based software, they mitigate risk, save money and meet compliance requirements. The software allows area owners to log into the software from their desktop and view the audit dashboard that includes everyone who has access to their doors. Within minutes the door owner can complete an audit. And when someone is removed from their audit list, the access is automatically removed from their record in the security management system, bypassing the security department, saving months of work and providing a total cost savings to the organization.

“The cost savings are almost immeasurable,” said AMAG Technology, Vice President - Client Services, Jeff LeBlanc. “Organizations that require quarterly audits realize diminished risk even more and save more money.”

Many industries must adhere to third party government imposed audits such as Sarbanes Oxley for the banking industry, HIPAA for the healthcare sector or Transportation Workers Identity Credential for workers who need access to secure areas of maritime facilities and vessels. While these audits are mandatory, they do not require a company to be in 100% compliance all the time. They demand the controls are in place to identify when they have fallen out of compliance. The software helps organizations implement audits to help them remain in compliance and meet standards imposed by the government.

Set Policies To Mitigate Risk

Organizations must set and manage policies that improve processes and save money, keep them secure without security team involvement and in compliance. While organizations have to meet third party audit requirements, which often prompt policy setting, most often policies are set to meet internal standards based on a set of parameters determined by the company in advance.

When an organization aligns
their security processes with
business operations using
policy- based software, they
mitigate risk, save money and
meet compliance requirements

For example, a policy can be created based on a person’s job title and building location. If a person has “director” in their title, they are issued a higher level of access throughout a bank or hospital. If the person’s title changes, the system will automatically change the default access assigned before and add a new level of access, which may include moving from one building to another or gaining a higher level of access within a building.

Other policies help mitigate risk exponentially such as a card revocation rule. If an access card is not used within a specified time, say 60 days, the system will automatically revoke the card temporarily. When this policy is implemented, companies discover just how many active cards are out there, not liable, and not used. Approximately 95% of temporary card revocations become permanent, meaning, a company discovers they are exposed to a big risk.

Another effective policy is the use it or lose it rule. When a card is not used at a specific door or access group within a specific amount of time, access is removed. This rule has produced amazing results for organizations. One client removed 60% of their access assignments when they implemented this policy. About 800,000 assignments were removed, and they received only 10 phone calls asking about access levels.

Setting a policy like this helps keep an organization's infrastructure in place and eliminate potential damage to its brand, reputation, intellectual property, assets and physical property.

When aligning security plans with reliable policies and procedures, organizations can reduce manual errors, meet compliance, improve operational effectiveness and save on total cost of ownership.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Disruptive Innovation Providing New Opportunities In Smart Cities
Disruptive Innovation Providing New Opportunities In Smart Cities

Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation. Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics. Adoption of disruptive technologies “Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realize their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.” “Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.” Challenges faced by cities Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness, and reducing costs. Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic. Smart technology “The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualization and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks, and detection of noise level, glass breaks, and gunshots. Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever, and ensure physical distancing. 2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience. Video solutions Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyze customer behaviors to create new routes, pathways, signage and to optimize cleaning operations. Personalized digital experiences will add to the overall entertainment value. In the public safety arena, video enables core capabilities such as protection of people, assets, and property, emergency response, and real-time visualization, and increased situational awareness. Video also provides intelligent incident management, better operational efficiency, and faster information sharing and collaboration. Smart video strategy Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming, and costly. Cities and public venues are looking for hardware, software, and industry expertise to provide the right mix of performance, capabilities, and cost-effectiveness. Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimization, enables customers to build and deploy high-performing computer vision and deep learning inference applications. Intel and Milestone partnership – Video solutions “Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.” As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing, and AI capabilities with Milestone’s video management software and community of analytics partners. Given its complex needs, the smart cities market is particularly inviting for these technologies.

What Are the Physical Security Challenges of Smart Cities?
What Are the Physical Security Challenges of Smart Cities?

The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analyzed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: What are the physical security challenges of smart cities?

New Markets For AI-Powered Smart Cameras In 2021
New Markets For AI-Powered Smart Cameras In 2021

Organizations faced a number of unforeseen challenges in nearly every business sector throughout 2020 – and continuing into 2021. Until now, businesses have been on the defensive, reacting to the shifting workforce and economic conditions, however, COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans. This is now giving decision-makers the chance to take a proactive approach to mitigate current and post-pandemic risks. These long-term technology solutions can be used for today’s new world of social distancing and face mask policies and flexibly repurposed for tomorrow’s renewed focus on efficiency and business optimization. For many, this emphasis on optimization will likely be precipitated by not only the resulting economic impacts of the pandemic but also the growing sophistication and maturity of technologies such as Artificial Intelligence (AI) and Machine Learning (ML), technologies that are coming of age just when they seem to be needed the most.COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans Combined with today’s cutting-edge computer vision capabilities, AI and ML have produced smart cameras that have enabled organizations to more easily implement and comply with new health and safety requirements. Smart cameras equipped with AI-enabled intelligent video analytic applications can also be used in a variety of use cases that take into account traditional security applications, as well as business or operational optimization, uses – all on a single camera. As the applications for video analytics become more and more mainstream - providing valuable insights to a variety of industries - 2021 will be a year to explore new areas of use for AI-powered cameras. Optimizing production workflows and product quality in agriculture Surveillance and monitoring technologies are offering value to industries such as agriculture by providing a cost-effective solution for monitoring of crops, business assets and optimizing production processes. As many in the agriculture sector seek to find new technologies to assist in reducing energy usage, as well as reduce the environmental strain of modern farming, they can find an unusual ally in smart surveillance. Some niche farming organizations are already implementing AI solutions to monitor crops for peak production freshness in order to reduce waste and increase product quality.  For users who face environmental threats, such as mold, parasites, or other insects, smart surveillance monitoring can assist in the early identification of these pests and notify proper personnel before damage has occurred. They can also monitor vast amounts of livestock in fields to ensure safety from predators or to identify if an animal is injured. Using video monitoring in the growing environment as well as along the supply chain can also prove valuable to large-scale agriculture production. Applications can track and manage inventory in real-time, improving knowledge of high-demand items and allowing for better supply chain planning, further reducing potential spoilage. Efficient monitoring in manufacturing and logistics New challenges have arisen in the transportation and logistics sector, with the industry experiencing global growth. While security and operational requirements are changing, smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye, but have a significant impact on the overall customer experience. Smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye. Video analytics can assist logistic service providers in successfully delivering the correct product to the right location and customer in its original condition, which normally requires the supply chain to be both secure and ultra-efficient. The latest camera technology and intelligent software algorithms can analyze footage directly on the camera – detecting a damaged package at the loading dock before it is loaded onto a truck for delivery. When shipments come in, smart cameras can also alert drivers of empty loading bays available for offloading or alert facility staff of potential blockages or hazards for incoming and outgoing vehicles that could delay delivery schedules planned down to the minute. For monitoring and detecting specific vehicles, computer vision in combination with video analysis enables security cameras to streamline access control measures with license plate recognition. Smart cameras equipped with this technology can identify incoming and outgoing trucks - ensuring that only authorized vehicles gain access to transfer points or warehouses. Enhance regulatory safety measures in industrial settings  Smart surveillance and AI-enabled applications can be used to ensure compliance with organizational or regulatory safety measures in industrial environments. Object detection apps can identify if employees are wearing proper safety gear, such as facial coverings, hard hats, or lifting belts. Similar to the prevention of break-ins and theft, cameras equipped with behavior detection can help to automatically recognize accidents at an early stage. For example, if a worker falls to the ground or is hit by a falling object, the system recognizes this as unusual behavior and reports it immediately. Going beyond employee safety is the ability to use this technology for vital preventative maintenance on machinery and structures. A camera can identify potential safety hazards, such as a loose cable causing sparks, potential wiring hazards, or even detect defects in raw materials. Other more subtle changes, such as gradual structural shifts/crack or increases in vibrations – ones that would take the human eye months or years to discover – are detectable by smart cameras trained to detect the first signs of mechanical deterioration that could potentially pose a physical safety risk to people or assets. Early recognition of fire and smoke is another use case where industrial decision-makers can find value. Conventional fire alarms are often difficult to properly mount in buildings or outdoor spaces and they require a lot of maintenance. Smart security cameras can be deployed in difficult or hard-to-reach areas. When equipped with fire detection applications, they can trigger notification far earlier than a conventional fire alarm – as well as reduce false alarms by distinguishing between smoke, fog, or other objects that trigger false alarms. By digitizing analog environments, whether a smoke detector or an analog pressure gauge, decision-makers will have access to a wealth of data for analysis that will enable them to optimize highly technical processes along different stages of manufacturing - as well as ensure employee safety and security of industrial assets and resources. Looking forward to the future of smart surveillance With the rise of automation in all three of these markets, from intelligent shelving systems in warehouses to autonomous-driving trucks, object detection for security threats, and the use of AI in monitoring agricultural crops and livestock, the overall demand for computer vision and video analytics will continue to grow. That is why now is the best time for decision-makers across a number of industries to examine their current infrastructure and determine if they are ready to make an investment in a sustainable, multi-use, and long-term security and business optimization solution.