Education security applications
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other univers...
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety Search Technology at more than 100 schools, Fulton has in...
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
Located within 10 miles of the U.S.A. - Mexico border on the southern tip of Texas, Harlingen Consolidated Independent School District (CISD) serves most of the cities of Harlingen and Palm Valley, the towns of Combes and Primera, and portions of unincorporated Cameron County, including the communities of Las Palmas-Juarez and Lasana. Over 18,000 students are enrolled in 29 schools across these communities. The school system has seventeen elementary schools, five middle schools, a ninth grade a...
The Customer Located in Brooklyn Park, Minnesota, North Hennepin Community College (NHCC) is one of the largest and most diverse community colleges in the state, serving more than 10,000 students enrolled in 60 degree and certificate programmes. With a rich tradition of excellence in teaching and learning, NHCC offers an exceptional student experience at one of the safest campuses in the country. NHCC’s all-inclusive public safety program includes regular foot and vehicle patrol, set buil...
Customer Butler University is a liberal arts school situated in a residential area, five miles from downtown Indianapolis, Indiana. The University has an enrollment of approximately 4,500 students and offers over 60 major academic fields of study in six colleges. Butler University’s 300 acre campus includes more than 30 buildings as well as a 20 acre garden, an observatory, and water areas. Challenge All universities today are looking for ways to improve physical security in order to p...
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business Access Controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labor and materials. Today we will look at four focus points: Vertical Markets, Cloud-Based Access Control, Technology Upgrades, and Preventative Maintenance and Service Agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical Markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective salesHaving logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-Based Access Control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology Upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive Maintenance And Service Agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labor 24/7” or a “parts and labor M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical Area Access Management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labor only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
Schools are continuing to upgrade security measures for pupil safety. However, on top of all the fundamental challenges schools face, implementing well-rounded and effective security solutions can seem a great difficulty. Andrew Shaw, architectural consultant for Allegion UK, discusses the advantages of electro-mechanical solutions. Schools can equate to some of the most complex security challenges for architects, specifiers and school officials alike. This is because choosing the right solution requires a comprehensive analysis of a building’s design and layout and the different requirements of each perimeter, alongside specific uses, user groups and opening hours. Different areas and spaces, such as reception areas, entry points or classrooms, each need to be approached differently in terms of safety and security measures. Precautionary Lockdown Strategy Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency What’s more, if the building is used for out-of-hours purposes, or if contractors are on-site, these issues will also need to be addressed. Simply put, there’s no one-size-fits-all solution for schools. Security hardware and a precautionary lockdown strategy are necessities, as they are integral to the safety of teachers, students and visitors. Adequate measures need to be implemented so that schools are prepared for, and safeguarded against, external threats or unauthorized access. While a lot of the responsibility falls on the shoulders of facility managers, it’s also important for teachers and administrators to be aware of, and educated on, solutions and training. This means knowing how certain hardware works and how to spot a faulty product. Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency. Unique Building Requirements This is becoming increasingly important with newer systems too, especially as the Internet of Things (IoT) becomes more commonplace within the industry. Integrating electro-mechanical solutions into existing school security systems is now more commonly viewed as an achievable and viable option. Because an off-the-shelf security solution to fit all doesn’t exist, the benefits of integrating both electronic and mechanical solutions into systems are quickly becoming realized. As such, schools are growing more accustomed to tailored solutions based on their own unique building requirements and budgets. Each school layout is unique and, therefore, must address a range of security factors specific to different areas. Many areas within a school’s building design must accommodate for high capacity, especially in places that may be part of a fire escape route. Mechanical Door Hardware Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds All schools need to address three different levels of security. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. Finally, the third level - and the most vulnerable - refers to the core of the school that both pupils and staff occupy. The first level of security is the perimeter, and these areas become more important depending on the time of day. Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds. Incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. Greater Visitor Management An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. This option also allows integration with central security systems, which can be automatically activated and pre-programmed for regular scheduled control. These solutions help lower the risk of potential unauthorized entry, which can lead to theft of equipment, and compromising people’s safety. They also aid facility and site managers in knowing where potential weak points are in the school perimeter. Because schools will most likely have multiple access points, the combination of mechanical hardware and access control systems allows for both security and convenience, providing greater control and monitoring. Efficient Access Control A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building The second level of security is the administration or reception area. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. This area should be able to restrict visitors from freely accessing the rest of the school. A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. When using access control solutions, schools are provided with information on who entered a part of the premises and when, are able to restrict or limit access to specific times of the day, and easily add and delete users, allowing them to manage access to the building more efficiently. Integrated Centralized Systems The areas most susceptible to vulnerability are the internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. For these areas, there are a number of different solutions that will be beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Mechanical solutions, which include a cylinder lock and key, are also ideal for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. When paired with electronic access control systems, mechanical hardware can provide simplified yet improved security levels. Electromagnetic Door Closers Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit In schools, it is often the case that entrance doors will also be fire exits. Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit. When integrated with electronic access control systems, emergency exit points become safer and more secure as access control measures can be added, whether for teachers, pupils or visitors. In the interest of fire safety, and to eliminate the illegal practice of propping fire doors open as well as aid free passage in busy areas, electromagnetic door closers can be linked with the building’s fire alarm system. When the fire alarm sounds (or in the event of a power outage), the electromagnet deactivates, bringing the door to a close in a normal manner, preventing the spread of fire and smoke. Building Design Requirements By design, electronic access control systems are also easy to use and maintain. The reliability and durability of such systems also means that there will be less need for excess time and money spent on maintenance, and there’s peace of mind in knowing the systems are code-compliant. Their flexibility additionally allows for the implementation of a highly-effective bespoke solution. Electronic access control and electronic devices are able to be integrated with or into a variety of other electronic and mechanical systems. This means schools are able to successfully tailor solutions to their own budgets and building design requirements. Fully integrated security solutions and biometrics are becoming increasingly affordable and accessible, giving school officials and managing teams greater control over their buildings. These solutions also give them scalability for the future, meaning systems are both future-proof and easily upgradable.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
In summer 2013, The University of Colorado at Boulder, commonly referred to as CU-Boulder, completed its project to install 5,700 SALTO RFID locks, replacing their previous magnetic stripe locks throughout all of the University’s residence halls. SALTO Systems’ use of RFID technology (Mifare, NFC, Desfire EV1), its robust architecture, and its ease of use all combined to make SALTO the clear choice for the future of CU-Boulder’s residence halls. Increased security awareness, aging infrastructure and pressure to cut operating costs are just some of the many reasons why schools, colleges and universities look to find new ways to enhance campus security. Multi-purpose access control system Student housing in particular is often a key area for upgrade. While each campus housing program is tailored to its individual location, many of the tasks it is required to perform are common across the country. These include assigning rooms, distributing keys, retrieving old keys and issuing new ones, and this can be a time consuming task that can involve large numbers of staff and lengthy waits for students. Then, there is the matter of lost keys and their associated costs which only adds to the workload. Add to this, that older systems used a card that was just a standard key. Today that same card is now almost certainly going to be a student ID card as well as a room key, campus key, and be used for managing in-room energy usage, purchasing food, study supplies, bookstore supplies and riding the bus to class. Being required to handle all this, plus providing facility management (remote lock/unlock, scheduling, access rights) requires a more modern approach to security. It needs an increasingly multi-layered approach that can maximize overall security now, while providing flexible future proof technology that will deliver lasting dollar value for the years ahead. An example of such a multi-purpose access control system installation can now be seen at the University of Colorado Boulder, which has just completed installation of some 3,900 SALTO RFID XS4 keypad locks and 1,800 non- keypad locks. Time to upgrade technology CU-Boulder is the flagship of the four-campus University of Colorado System, which also includes the University of Colorado Denver, University of Colorado Anschutz Medical Campus and University of Colorado Springs. Situated on one of the most spectacular campuses in the country, it offers approximately 3,600 courses in 150 fields of study in arts and sciences, business, education, engineering, environmental design, journalism, law and music. There are currently 26 residence halls on campus at CU- Boulder. The residence hall room types range from singles to four person rooms and others with apartment style amenities. Along with that, there are some rooms that have more amenities than others, including a full bathroom and/or a kitchen. The majority of the students living in the residence halls are freshmen, but any year student can live on campus. There are several communities of residence halls located throughout the campus and in a separate area called Williams Village, which is connected to the main campus via the local bus transit service. SALTO Systems were selected for its use of RFID technology, robust architecture, and ease of use With this in mind, CU-Boulder’s existing magnetic stripe door access system used in the student residence halls was aging and the university wanted to move their locking systems to newer, more secure RFID card technology. A program was initiated by HDS Information Technology Department to evaluate alternative solutions that could offer them both the higher levels of security that they wanted as well as the encrypted RFID technology that could be leveraged for their transit system and other uses on campus. Challenges Larry Drees, Assistant Director HDS Information Technology at CU-Boulder says, “Having used a mix of magnetic stripe door access systems as well as keypad and PIN enabled locks as a part of our residence room standard for many years; we wanted to upgrade our technology, but still have something that was easy to manage. “Our residence halls are busy places with high traffic areas, so any replacement locking system would have to be robust. Encrypted RFID technology was an important requirement for us, but we also wanted something that was reliable and easy to install. Also, we wanted our new system to be capable of integration with our Ecopass transit system and our campus Software House's C-Cure 9000 access control system within the next 12-24 months. In addition, we were impressed with the variety of locking hardware options giving us additional levels of security on a case by case basis while still being capable of management within a single system. After many months of reviewing the options currently on the market, we settled on SALTO’s XS4 solution as the locking system that could give us the functionality and technology options we wanted, at a standalone off-line locking system price point. The ability to transfer information to and from the lock via an RFID card is also something we think will be helpful in managing these locks over the long term.” Planning and installation “Ensuring the safety of students and their assets in residence accommodation is always a high priority,” confirms Tim Moreno, Western Region Sales Manager for SALTO Systems. “Looking at the layout of the campus and the position of the various residence halls, we assessed usage and the level of security required and then worked with Larry and his team to design and subsequently install a highly secure and flexible networked access control system to meet all the needs of the university.” The solution chosen was the SALTO XS4 keypad lock which is designed to provide increased levels of security and control for doors where extra security may be required. It offers users a choice of multiple security authentication methods to control access including RFID smart cards (DESFire EV1 smart cards at CU-Boulder), combined use of a PIN (Personal Identification Number) code + smart card or a separate keypad code. The lock can be operated in 3 modes; smart card only, pin code + smart card or keypad code only. With standard smart card mode, the lock is locked at all times until opened with the student’s key card that has access rights to that room. "Controlling access and securing our residence buildings is crucial. We now have 26 residence halls and 3 administrative support buildings using SALTO locks", says Larry Drees, Assistant Director HDS Information Technology at CU-Boulder When using pin code + card mode, each student has their own personal code. Typically, this is used where extra security and dual authentication (presenting both a card and typing in the pin code) are needed, and students can have up to an 8-digit pin code. In keypad code only mode, the lock itself has an access code that is used for student authentication. Every student that goes through that door knows the keypad code. When two students share the same residence room, they are the only ones that know the keypad code of that room, and again, students can have up to an 8-digit keypad code. “The university also plans to install the SALTO solution into the lobbies controlling the private secure areas of the halls,” Moreno says, “and from a management point of view the XS4 keypad locks can handle up to 64,000 doors and 4,000,000 users on a single system, with each individual lock recording the last 1,000 audit trail events at that door in its memory.” Benefits Larry Drees summarizes, “Controlling access and securing our residence buildings is crucial. We now have 26 residence halls and 3 administrative support buildings using SALTO locks. At this point, we are keeping our system setup pretty simple. Most doors are student rooms which are locked 24/7, and we do not use the calendar features of the system to any great extent at this time. We also plan to work with SALTO to improve the user interface so we can restrict functionality at a more granular level. Now that the system has been implemented, we’re pretty satisfied with the quality and efficiency of the product. Besides helping us move closer to the university’s vision for utilizing RFID technology, the new system also leverages this technology while helping us meet our goal to provide a safe and secure environment for our students.”
Customer: George Mason University is one of Virginia's fastest growing higher education institutions with four campuses and 35,000 students. Located in the heart of Northern Virginia's technology corridor near Washington, D.C., George Mason University offers strong undergraduate and graduate degree programs in engineering, information technology, biotechnology and health care. The George Mason University School of Law has been recognized by U.S. News and World Report as one of the top 40 law schools in the United States. Challenge: The previous video system at George Mason University suffered from poor video quality and a lack of standardization. The legacy system could not provide the needed levels of video surveillance, either related to the area being viewed or the quality of images needed to identify events and/or individuals. A new construction project included the required funds for an initial investment in an IP-based surveillance system. The University needed a system that could provide better video quality to capture facial recognition and to offer a wider range of options. Megapixel Solution: A need for better image quality led George Mason University directly to IP-based megapixel camera technology. The University evaluated several well-known camera suppliers before deciding on Arecont Vision, which leads competitors related to processing power, breadth of the product line, and use of H.264 compression technology to minimize bandwidth and storage needs. "We have installed almost every variety of megapixel camera made by Arecont Vision, from the 1.3 megapixel MegaDome® to the 8 megapixel 360-degree SurroundVideo® panoramic camera," said James L. McCarthy Jr., Director of Physical Security, George Mason University, Fairfax, Virginia. The capabilities of various cameras are matched to the areas they need to cover. Cameras have been installed in athletic facilities, including an Olympic-sized pool; in academic buildings; and in parking garages, according to Brian Piccolo, Senior Account Executive, S3 Integration, Baltimore, Maryland. The system was designed jointly by George Mason University and S3 Integration. Future installations will include the University's residence halls. Two panoramic 360-degree cameras are positioned over a broad plaza area to enable surveillance of activity on the plaza while also covering doors leading into an adjacent building. Each camera's 8 megapixel images (from four 2 megapixel sensors) provide 360-degree coverage from inside a 6-inch dome. The camera is used to view large areas while capturing megapixel detail. Each camera provides up to 6400 x 1200-pixel images at 5.5 frames per second (fps), or can be set for lower resolutions at higher frame speeds, such as 1600x1200-pixel images at 22 fps. The cameras use Arecont Vision's MegaVideo® image processing at billions of operations per second. The cameras also provide image cropping and up to four regions of interest. Several 180-degree cameras cover the pools and gym floors in George Mason's athletic facilities. The 8 megapixel, 180-degree panoramic camera also incorporates four 2 megapixel CMOS image sensors to provide 6400 x 1200-pixel panoramic images at 5.5 fps. Covering long and narrow runs (such as hallways and drives) are 3 and 5 megapixel cameras from Arecont Vision. Arecont Vision's 5 megapixel camera uses a 1/2-in. CMOS sensor to provide 2,592 x 1,944-pixel images at 9 frames-per-second. Light sensitivity is 0.3 lux at F1.4. The camera can output multiple image formats, allowing the simultaneous viewing of the full-resolution field-of-view and regions of interest for high-definition forensic zooming. Arecont Vision's 3 megapixel camera provides 2048 x 1536-pixel images at 15 frames per second. Light sensitivity is 0.2 lux at F1.4. The images from Arecont Vision's IP megapixel cameras are fed to a local ExacqVision network video recorder, which is monitored by a Central Security Operations Centre The images from Arecont Vision's IP megapixel cameras are fed to a local ExacqVision network video recorder, which is monitored by a Central Security Operations Center. Signals from some of the cameras are also fed to a central server that have been downloaded with Exacq software. All video data is transmitted over a secured, firewalled, standalone security network within the George Mason University intranet system. The majority of the Arecont Vision cameras are placed in areas where there is sufficient light at all times. Parking garages are currently monitored with Arecont Vision day/night cameras, which use a motorized infrared (IR) cut filter. These cameras can monitor license plate numbers and increase the productivity of garage personnel by monitoring daily tasks like: credit card transactions, remotely. Now, any George Mason University department that wants to add video surveillance can call on S3 Integration to upgrade and expand the system using funds provided through departmental budgets. Megapixel Benefits: "Advantages of Arecont Vision cameras over competitive products include performance, versatility, price and ease-of-use," said Mr. Piccolo. The end-user customer especially likes the ease-of-use and the sharp pictures available from the various Arecont Vision models. "The price point was better and [the cameras] helped eliminate some costs," said Mr. Piccolo. "We now have better forensic capabilities and more flexibility in the recovery of data," added Mr. McCarthy. The main attribute of the Arecont Vision camera line is the ability to install fewer cameras while capturing video from a larger area. Fixed megapixel cameras providing virtual pan-tilt-zoom (PTZ) within captured images translates into fewer moving parts than traditional PTZ systems, which reduces overall maintenance cost and the potential for system failure. The picture quality and digital zoom capabilities of Arecont Vision cameras far exceed analog technology and allow George Mason University to retrieve usable video. Combined with recent cost reductions in NVR storage and network switches, the use of fewer cameras allows George Mason University to transition to higher-quality video at a minimum increase in cost. Megapixel imaging represents a significant upgrade in system functionality compared to standard-resolution cameras. In addition to lower bandwidth and storage requirements, using fewer megapixel cameras to cover larger areas can dramatically decrease costs related to other elements of a system, such as fewer software licenses, fewer lenses, and a decrease in man-hours needed to install the system.
The Muhammad Ali Center is a cultural attraction / international education center inspired by the ideals of its visionary founder, Muhammad Ali. Featuring two-and-a-half levels of interactive exhibits and captivating multimedia presentations, the Ali Center carries on Ali's legacy and inspires the exploration of the greatness within ourselves. It includes a five-screen orientation theater, timeline of Ali's life, historical Civil Rights era and fight footage, exhibit galleries, and hands-on boxing fun. It also includes an Ali Center retail store and lunch café. The Ali Center has over 30 cameras protecting the museum and its 3-level underground parking garage. The existing surveillance system transmitted analog video 800 to 1200 ft over traditional coax cable to the control room. To improve image resolution and flexibility, the museum decided to upgrade to a new IP-based system. The project was not as straightforward as initially thought. Budgets had to be met and facility disruptions kept to a minimum. To perform the upgrade the Ali Center turned to Tyco Integrated Security. After a careful site plan review, Tyco Integrated Security recommended the NVT Ethernet over Coax (EoC) solution based on past successes at other customer sites because: Re-deployed coax eliminates the expense for pulling out old cable and the installation of new network wiring; There would be zero facility disruption; Power-over-Ethernet signals are easily delivered at extended distances without the need for mid-span repeaters or IDF wiring closets. Successful deployment experiences at other Tyco customers’ sites. In selecting the NVT Ethernet over Coax solution, the Ali Center was able to install a cost-effective state of the art surveillance upgrade, using existing cable at extended distances with no disruption to visitor enjoyment of the facility.
The contactless readers on the front of the dorms remain the same, but instead of being issued keys for access to specific rooms students will now taptheir card and enter a PIN for access, says Keith Tuccillo, system administrator for life safety and security systems at Princeton. Deployment At Princeton’s Housing Facilities Using technology from SALTO Systems, the massive deployment includes 53 residence halls and 3,700 individual locks. It impacts about 9,000 undergraduate and graduate students living in Princeton’s housing facilities. Previously students would tap their HID iCLASS 32K card at the main entrance and then use a key for access to their rooms, Tuccillo explains. Starting in the fall, after students are through the main entrance they tap the card on a reader and enter a PIN to access their room. “The housing department wanted something more robust,” says Trucillo, explaining the choice to require both contactless read and PIN entry. They wanted two-factor authentication so that if a student lost an ID card someone could not gain access to their room, he explains. To meet this need, Princeton chose SALTO’s XS4 lock with keypad. For added security, the campus is assigning PINs rather than allowing students to self-select their own. “This is to avoid students choosing 1-2-3-4 as their PIN,” Tuccillo says. Students have been notified of their PIN and the changes to the physical access control system through email, physical mail and other print materials. The Data On Card Concept “In a SALTO system, all data required to make an access decision is held on the card,” explains Mike Mahon, Senior VP Commercial Sales, SALTO Systems. The lock and card communicate with each other to determine if access should be approved or declined. This eliminates the need for online connectivity to a central database during access transactions. In addition, Mahon explains that the cards themselves can act as transport, carrying system data throughout the network of readers. Cards pickup data from readers in the normal course of entries and exits and spread this data to other readers in a viral manner during subsequent transactions. This Data on Card concept is a key part of what SALTO calls the SALTO Virtual Network. Another key component is the series of online readers known as hotspots. At a hotspot, cards can be revalidated, PINs changed and access rights adjusted. Additionally, important system data can be loaded for viral dissemination. Hotspots can be normal online exterior door readers or they can be dedicated stations, conveniently located within a building. Revalidation of card privileges at hotspots is crucial to the SALTO Virtual Network architecture. In traditional online access control systems, cards and privileges are revoked. Access rights for a terminated employee or student are turned off in the central system and all subsequent access requests are declined during the online transaction. But this presents a challenge in offline environments, as the removal of rights for a terminated cardholder cannot be communicated immediately to the deployed readers. SALTO solved this challenge by reversing the traditional access control model. “Rather than granting privileges with no expiration or extremely long life spans, we grant short term privileges and use the power of our hotspots to facilitate rapid, seamless revalidation,”explains Mahon. "Princeton opted to connect the interior XSR locks via Wi-Fi to enable real-time audit tracking for access transactions" Imagine a building with two exterior doors and two hundred interior doors controlled with SALTO locks. Cardholder privileges are set to expire every 24 hours and all interior locks operate completely offline. Each time a cardholders enters the building, the students’ privileges are revalidated and rewritten to the card granting access for the next 24-hour period. This enables the student to pass through any approved interior door readers. If the individual is fired or expelled, the card will no longer be revalidated at an exterior door and the current privileges on the card will expire at the end of the 24-hour window. Furthermore, as other cardholders enter through the exterior doors and are revalidated, the terminated cardholder data is written to the card for viral distribution. As these valid cards are presented to offline door locks through the normal course of operations, the terminated card is added to the lock’s blacklist. If the terminated card is presented to that lock during the few hours it still has remaining on from its prior validation, access is denied and the card rendered inactive. Benefits From Both Online And Offline Functionality Because SALTO makes all access decisions offline between the card and the reader, the system is not impacted by network or power disruptions. But while the system can function in a fully offline mode, online operation via wireless enables additional functionality. “Princeton opted to connect the interior XSR locks via Wi-Fi to enable real-time audit tracking for access transactions, instantaneous lock down and remote door scheduling,”says Mahon. This also reduces the reliance on revalidation of credentials as terminated cardholders can be removed from the deployed readers via online notification. The university chose to revalidate at different intervals based on group, for example staff once per week, students and faculty once per semester and certain staff every 48 hours, explains Mahon. The new system offers Princeton more flexibility and potentially saves money. In the past, if a key was lost the lock had to be re-keyed. With the new system, however, changes can be made to the physical access control system removing the lost card and issuing a new credential for the student. It also streamlines the process for granting contractors access to residence hall rooms. Physical master keys were assigned or temporarily issued to contractors. The problem with master key-based systems is that lost keys create extreme vulnerabilities and costs. In traditional environments, a lost master key would entail mass rekeying at significant expense. In the new environment, the contractor is issued a card with only the appropriate privileges. If lost, the card is simply canceled and the risk mitigated. The new system also keeps an audit trail of who accessed what locations and when. The new system was two-years in the making, Tuccillo explains. With the start of the Fall semester, students and campus administrators should start reaping the benefits of these efforts to better secure Princeton’s residential facilities.
Learn how the Georgia Tech Police Department deployed a web-based physical access control system (PACS) to manage facility access from any web browser, partition role-based access privileges by building, synchronize with campus-wide identity management systems and reduce total cost of ownership. Managing Campus Facility Access Within A Virtual Server Environment The Georgia Institute of Technology campus occupies 400 acres in the heart of Atlanta, Georgia, with 900 full-time instructional faculty and more than 20,000 undergraduate and graduate students. The Georgia Tech Police Department (GTPD) is responsible for ensuring campus safety and building security 24/7 and is responsible for managing access to more than 1,800 doors across multiple campuses, buildings and parking garages using the Georgia Tech BuzzCard access control system. Download this free case study to learn how the Georgia Tech Police Department implemented a web-based Physical Access Control System (PACS) which provided the following benefits: Manage facility access from any web browser Partition role-based access control privileges by building Synchronize with campus-wide identity management systems Eliminate the cost and complexity of legacy security systems Leverage it investments in hardware virtualization Install non-proprietary door hardware and controllers
Reykjavik University (RU) is a vibrant international university located at the heart of Reykjavik, the capital of Iceland. Reykjavik University is Iceland's largest private university and focuses on research, excellence in teaching, entrepreneurship, technology development and co-operation with the active business community. RU has been happily using HID proximity technology to secure its buildings for many years. About three years ago the university decided to build a larger, more modern and first-rate facility to accommodate all of the university's five-degree courses in the future. Designing this new facility for RU was not an overnight task. Many hours of planning and research were put in to ensure the best possible building for RU. The university's technical manager Ellert Igni Hararson spent almost a year researching the applications and products that may be suitable for RU and in the course of his research, he also met with HID Global at their EMEA offices in Haverhill, UK. To make the new building a success, RU worked closely with Securitas Iceland who, together with the University's building consultant Eiríkur K. Þorbjörnsson, designed a solution to fit the university's vision. RU's vision was to have an almost "key-free" building, not only to increase the convenience and security for students and staff but also to reduce costs and increase efficiency. Whatever solution was to be chosen today needed to also be able to grow and fulfil our future requirements of a high-tech system and building. "Our vision is to have a true multi-application s art card that in the future can be enabled for cashless vending, canteen, on-de and printing, photo ID, library, use of lockers and maybe even more! We are also working with the wider community to extend the use of student cards for public services, such as for buses, the museum and swimming pools. We really would like to see the use of smart cards adopted even beyond the boundaries of the university and make the advantages of multi-application ID cards available to everyone," explains Ellert. Eiríkur adds, "by planning for a true multi-application future from the start, with this project we were able to ensure a quick return on investment for the university." Content with the existing HID PROX® solution and after much research, the university decided to transition to HID iCLASS®, using both multi-technology cards and readers. iCLASS was considered a cost-effective and convenient choice as it made migration to smart cards simple. "From the outset it was important for us that students who were issued access cards for the old building would be able to use their cards and gain access also in the new building", Ellert explains. The university charges students a nominal fee for their cards, which according to Ellert has helped to reduce card loss to almost zero, as students associate value to their cards instantly. The overall system now installed at the university extends the boundaries of access control and has also seamlessly integrated lighting, electrics and room allocation control. "We are trying not only to provide a secure and high-tech facility for our students and staff but to also be green and conscious of our environment around us. Such integrated solutions helps us to learn about how rooms and areas within the university are used, allowing us to become ever more intelligent and efficient",says Ellert. "We are trying not only to provide a secure and high-tech facility but to also be green and conscious of our environment" Today, HID Global's multi-technology's art cards provide about 4000 students access to all the university buildings and by students uploading a photograph to the university's intranet, their card will be issued to the on their very first day of school with all their details and photo already printed on it. "We use a FARGO® HDP5000, which is handled by our receptionists who are able to deliver cards to new students even during the busy periods at the beginning of term", explains Ellert. The cards are used throughout the old and the new buildings to gain access to classrooms, lab rooms and study areas 365 days a year and 24 hours a day. The new ca pus is not yet complete and the current facility is still being extended by another 7000m2, which is planned for completion in August 2010. "Iceland itself is a very-forward thinking country and most of our local and international students have been in touch with s art cards and access control cards before, therefore the adoption of s art cards was very quick and we have received very good feedback from our students and staff so far", says Eiríkur. Ellert and Eiríkur conclude that they are excited about the possible future use and applications of their s art cards, hoping that one day in the not so distant future, the university cards can be used on the local bus, the public library and even at the theatre. "RU has the determination to think big, to always improve the university's ability, and to decisively carry out our plans. We are all responsible for our continued success. The future of RU is in our hands", says technical manager Ellert. "With HID Global solutions, we are set to make our ambitious vision for the future a successful reality today and build on it for the future". For more information on how HID helped Reykjavik University , watch the case study video: Watch the video to see how HID helped upgrade Reykjavik University's security system