Education security applications
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
Located within 10 miles of the U.S.A. - Mexico border on the southern tip of Texas, Harlingen Consolidated Independent School District (CISD) serves most of the cities of Harlingen and Palm Valley, the towns of Combes and Primera, and portions of unincorporated Cameron County, including the communities of Las Palmas-Juarez and Lasana. Over 18,000 students are enrolled in 29 schools across these communities. The school system has seventeen elementary schools, five middle schools, a ninth grade a...
The Customer Located in Brooklyn Park, Minnesota, North Hennepin Community College (NHCC) is one of the largest and most diverse community colleges in the state, serving more than 10,000 students enrolled in 60 degree and certificate programmes. With a rich tradition of excellence in teaching and learning, NHCC offers an exceptional student experience at one of the safest campuses in the country. NHCC’s all-inclusive public safety program includes regular foot and vehicle patrol, set buil...
Customer Butler University is a liberal arts school situated in a residential area, five miles from downtown Indianapolis, Indiana. The University has an enrollment of approximately 4,500 students and offers over 60 major academic fields of study in six colleges. Butler University’s 300 acre campus includes more than 30 buildings as well as a 20 acre garden, an observatory, and water areas. Challenge All universities today are looking for ways to improve physical security in order to p...
In summer 2013, The University of Colorado at Boulder, commonly referred to as CU-Boulder, completed its project to install 5,700 SALTO RFID locks, replacing their previous magnetic stripe locks throughout all of the University’s residence halls. SALTO Systems’ use of RFID technology (Mifare, NFC, Desfire EV1), its robust architecture, and its ease of use all combined to make SALTO the clear choice for the future of CU-Boulder’s residence halls. Increased security awareness, a...
Customer: George Mason University is one of Virginia's fastest growing higher education institutions with four campuses and 35,000 students. Located in the heart of Northern Virginia's technology corridor near Washington, D.C., George Mason University offers strong undergraduate and graduate degree programs in engineering, information technology, biotechnology and health care. The George Mason University School of Law has been recognized by U.S. News and World Report as one of the top 40 law sc...
With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data analysis delivering actionable insights that can improve operational efficiencies, better understand customer buying behaviors, or simply just provide added value and intelligence. Growth of Ultra-HD Surveillance To ensure that the quality of the data is good enough to extract the details required to drive these insights, surveillance cameras are technologically evolving as well, not only with expanded capabilities surrounding optical zoom and motion range,4K Ultra HD-compliant networked cameras are expected to grow from 0.4 percent shipped in 2017, to 28 percent in 2021 but also relating to improvements in signal-to-noise (S2N) ratios, light sensitivities (and the minimum illumination needed to produce usable images), wide dynamic ranges (WDR) for varying foreground and background illumination requirements, and of course, higher quality resolutions. As such, 4K Ultra HD-compliant networked cameras are expected to grow from 0.4 percent shipped in 2017, to 28 percent in 2021, representing an astonishing 170 percent growth per year, and will require three to six times the storage space of 1080p video dependent on the compression technology used. Surveillance cameras are typically connected to a networked video recorder (NVR) that acts as a gateway or local server, collecting data from the cameras and running video management software (VMS), as well as analytics. Capturing this data is dependent on the communications path between individual cameras and the NVR. If this connection is lost, whether intentional, unintentional, or a simple malfunction, surveillance video will no longer be captured and the system will cease operations. Therefore, it has become common to use microSD cards in surveillance cameras as a failsafe mechanism. Despite lost connectivity to the NVR, the camera can still record and capture raw footage locally until the network is restored, which in itself, could take a long time depending on maintenance staff or equipment availability, weather conditions, or other unplanned issues. Since microSD cards play a critical role as a failsafe mechanism to ensure service availability, it is important to choose the right card for capturing video footage. It has become common to use microSD cards in surveillance cameras as a failsafe mechanism if an NVR breaks Key Characteristics Of microSDs There are many different microSD cards to choose from for video capture at the network’s edge, and they range from industrial grade capabilities to commercial or retail grade, and everything in-between. To help make some of these uncertainties a little more certain, here are the key microSD card characteristics for video camera capture. Designed For Surveillance As the market enjoys steady growth, storage vendors want to participate and have done so with a number of repurposed, repackaged, remarketed microSD cards targeted for video surveillance but with not much robustness, performance or capabilities specific to the application. Adding the absence of mean-time between failure (MTBF) specifications to the equation, microSD card reliability is typically a perceived measurement -- measured in hours of operation and relatively vague and hidden under metrics associated with the camera’s resolution and compression ratio. Therefore, when selecting a microSD card for surveillance cams at the edge, the choice should include a vendor that is trusted, has experience and a proven storage portfolio in video surveillance, and in microSD card technologies. Endurance, as it relates to microSD cards, represents the number of rewrites possible before the card can no longer store data correctly High Endurance Endurance, as it relates to microSD cards, represents the number of rewrites (program/erase cycles) that are possible before the card can no longer store data correctly. The rewrite operation is cyclical whereby a new stream of footage replaces older content by writing over it until the card is full, and the cycle repeats. The higher the endurance, the longer the card will perform before it needs to be replaced. Endurance is also referred to in terabytes written (TBW) or by the number of hours that the card can record continuously (while overwriting data) before a failure will occur. Health Monitoring Health monitoring is a desired capability that not many microSD cards currently support and enables the host system to check when the endurance levels of a card are low and needs to be replaced. Having a card that supports this capability enables system integrators and operators with the ability to perform preemptive maintenance that will help to reduce system failures, as well as associated maintenance costs. Performance To capture continuous streams of raw footage, microSD cards within surveillance cams perform write operations about seventy to ninety percent of the time, whereas reading captured footage is performed about ten to thirty percent. The difference in read/write performance is dependent on whether the card is used in an artificial intelligent (AI) capable camera, or a standard one. microSD cards deployed within surveillance cameras should support temperature ranges from -25 degrees Celsius to 85 degrees Celsius Finding a card that is write-friendly, and can provide enough bandwidth to properly capture streamed data, and is cost-effective, requires one that falls between fast industrial card capabilities and slower commercial ones. Bandwidth in the range of 50 MB/sec for writes and 80 MB/sec for reads are typical and sufficient for microSD cards deployed within surveillance cameras. Temperature Ranges Lower capacity support of 32GB can provide room to attract the smaller or entry-level video surveillance deployments As microSD cards must be designed for continuous operation in extreme weather conditions and a variety of climates, whether located indoors or out, support for various temperature ranges are another consideration. Given the wide spectrum of temperatures required by the camera makers, microSD cards deployed within surveillance cameras should support temperature ranges from -25 degrees Celsius to 85 degrees Celsius, or in extreme cases, as low as -40 degrees Celsius. Capacity Selecting the right-sized capacity is also very important as there needs to be a minimum level to ensure that there is enough room to hold footage for a number of days or weeks before it is overwritten or the connectivity to the NVR is restored. Though 64GB is considered the capacity sweet spot for microSD cards deployed within surveillance cameras today, lower capacity support of 32GB can provide room to attract the smaller or entry-level video surveillance deployments. In the future, even higher capacities will be important for specific use cases and will potentially become standard capacities as the market evolves. When choosing the right storage microSD card to implement into your video surveillance system, make sure the card is designed specifically for the application – does it include the right levels of endurance and performance to capture continuous streams – can it withstand environmental challenges and wide temperature extremes – will it enable preventative and preemptive maintenance to provide years of service? It is critical for the surveillance system to be able to collect video footage whether the camera is connected to an NVR or is a standalone camera as collecting footage at the base of the surveillance system is the most crucial point of failure. As such, failsafe mechanisms are required to keep the camera recording until the network is restored.
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?
A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their grievances, and to suggest alternative solutions, says James Cawood, President of Factor One Inc. “It’s helpful to consider their perspective at a point of time, and how do I use that information in a way that explores the issues and influences them to seek other means of achieving their goals without violence?” suggests Cawood. Preventing Workplace Violence An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator Factor One specialises in violence risk management, threat assessment, behavioural analysis, security consulting and investigations. Cawood will present his insights into preventing workplace violence in a session titled “Workplace Violence Interventions: The Instigator’s Perception Matters” during GSX 2018 in Las Vegas, September 23-27. Intervening and seeking to understand the instigator’s viewpoint can direct them away from violence. Often, diffusing a situation can prevent tragedy. Delaying a violent act is a means of prevention, given that the instigator might not reach the same level of stress again. Cawood says several recent examples of workplace violence illustrate the importance of identifying behavioural precursors and intervening. It is difficult to quantify the benefits of such an approach, since no one is keeping statistics on incident that were successfully diverted, he says. Reaching A Mutually Agreeable Solution “Accommodation and appeasement often won’t serve the problem,” says Cawood. “Instead of projecting our needs on what would be effective for us, we must really understand what matters to them and what we are able to do to solve the problem. “It’s about listening and reflecting back to reach a mutual agreement of their perspective of what matters,” he says. “Now we can talk about what’s possible or not. Is there something concrete I can do that is within the rules? Just being heard in depth is a de-escalator of violence.” It’s the same methodology used by hostage negotiators: Listen, reflect back, and come to a mutually agreeable solution. Giving a troubled employee a severance package – money – might not address their underlying complaints For example, giving a troubled employee a severance package – money – might not address their underlying complaints. “We may not have solved the underlying problem as they perceive it,” says Cawood. “They may feel disrespected or picked on. There may be an underlying mental condition, such as paranoia, or a grandiose sense of self-worth, underlying filters that have nothing to do with money.” GSX Networking And Education GSX is the new branding for ASIS International’s trade show, attended by more than 22,000 worldwide security professionals Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Cawood’s session will be September 24 from 2:15 to 3:30 p.m. “My purpose is to hone in on an area of workplace violence that is often ignored,” says Cawood. Cawood started out in law enforcement in the 1970s and transitioned to security in the 1980s. His credentials are typical of the high level of speakers presenting at GSX 2018: He holds a Master’s Degree in Forensic Psychology, and a Doctorate in Psychology, is a Certified Threat Manager (CTM), and has successfully assessed and managed more than 5,000 violence-related cases. He is the former Association President of the Association of Threat Assessment Professionals (ATAP) and currently the Vice-Chair of the Certified Threat Manager program for ATAP. Cawood has written extensively on the topic of violence risk assessment, and co-authored a book, Violence Assessment and Intervention: The Practitioner's Handbook. Cawood has been active in ASIS International since the 1980s and sees value in attending GSX 2018. “People from all over the world are coming and being exposed to a common set of topics to use as jump-off points for additional conversations. People from all types of experiences and exposures will be providing information through those lenses.” Knowledge gained from GSX provides a “real chance to drink from a fire hose” and get a deeper understanding of a range of topics. The relationships and networking are another benefit: “Nothing is more powerful than knowing someone face-to-face,” he adds.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove compartment despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle.Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment Rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, September 23-27. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions On Gun Visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organizations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organizations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX Education Program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organization around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of after-sale service, and how can manufacturer’s make it better? We asked this week’s Expert Panel Roundtable: How can security system manufacturers improve their after-sale service for integrators and end users?
The Muhammad Ali Center is a cultural attraction / international education center inspired by the ideals of its visionary founder, Muhammad Ali. Featuring two-and-a-half levels of interactive exhibits and captivating multimedia presentations, the Ali Center carries on Ali's legacy and inspires the exploration of the greatness within ourselves. It includes a five-screen orientation theater, timeline of Ali's life, historical Civil Rights era and fight footage, exhibit galleries, and hands-on boxing fun. It also includes an Ali Center retail store and lunch café. The Ali Center has over 30 cameras protecting the museum and its 3-level underground parking garage. The existing surveillance system transmitted analog video 800 to 1200 ft over traditional coax cable to the control room. To improve image resolution and flexibility, the museum decided to upgrade to a new IP-based system. The project was not as straightforward as initially thought. Budgets had to be met and facility disruptions kept to a minimum. To perform the upgrade the Ali Center turned to Tyco Integrated Security. After a careful site plan review, Tyco Integrated Security recommended the NVT Ethernet over Coax (EoC) solution based on past successes at other customer sites because: Re-deployed coax eliminates the expense for pulling out old cable and the installation of new network wiring; There would be zero facility disruption; Power-over-Ethernet signals are easily delivered at extended distances without the need for mid-span repeaters or IDF wiring closets. Successful deployment experiences at other Tyco customers’ sites. In selecting the NVT Ethernet over Coax solution, the Ali Center was able to install a cost-effective state of the art surveillance upgrade, using existing cable at extended distances with no disruption to visitor enjoyment of the facility.
The contactless readers on the front of the dorms remain the same, but instead of being issued keys for access to specific rooms students will now taptheir card and enter a PIN for access, says Keith Tuccillo, system administrator for life safety and security systems at Princeton. Deployment At Princeton’s Housing Facilities Using technology from SALTO Systems, the massive deployment includes 53 residence halls and 3,700 individual locks. It impacts about 9,000 undergraduate and graduate students living in Princeton’s housing facilities. Previously students would tap their HID iCLASS 32K card at the main entrance and then use a key for access to their rooms, Tuccillo explains. Starting in the fall, after students are through the main entrance they tap the card on a reader and enter a PIN to access their room. “The housing department wanted something more robust,” says Trucillo, explaining the choice to require both contactless read and PIN entry. They wanted two-factor authentication so that if a student lost an ID card someone could not gain access to their room, he explains. To meet this need, Princeton chose SALTO’s XS4 lock with keypad. For added security, the campus is assigning PINs rather than allowing students to self-select their own. “This is to avoid students choosing 1-2-3-4 as their PIN,” Tuccillo says. Students have been notified of their PIN and the changes to the physical access control system through email, physical mail and other print materials. The Data On Card Concept “In a SALTO system, all data required to make an access decision is held on the card,” explains Mike Mahon, Senior VP Commercial Sales, SALTO Systems. The lock and card communicate with each other to determine if access should be approved or declined. This eliminates the need for online connectivity to a central database during access transactions. In addition, Mahon explains that the cards themselves can act as transport, carrying system data throughout the network of readers. Cards pickup data from readers in the normal course of entries and exits and spread this data to other readers in a viral manner during subsequent transactions. This Data on Card concept is a key part of what SALTO calls the SALTO Virtual Network. Another key component is the series of online readers known as hotspots. At a hotspot, cards can be revalidated, PINs changed and access rights adjusted. Additionally, important system data can be loaded for viral dissemination. Hotspots can be normal online exterior door readers or they can be dedicated stations, conveniently located within a building. Revalidation of card privileges at hotspots is crucial to the SALTO Virtual Network architecture. In traditional online access control systems, cards and privileges are revoked. Access rights for a terminated employee or student are turned off in the central system and all subsequent access requests are declined during the online transaction. But this presents a challenge in offline environments, as the removal of rights for a terminated cardholder cannot be communicated immediately to the deployed readers. SALTO solved this challenge by reversing the traditional access control model. “Rather than granting privileges with no expiration or extremely long life spans, we grant short term privileges and use the power of our hotspots to facilitate rapid, seamless revalidation,”explains Mahon. "Princeton opted to connect the interior XSR locks via Wi-Fi to enable real-time audit tracking for access transactions" Imagine a building with two exterior doors and two hundred interior doors controlled with SALTO locks. Cardholder privileges are set to expire every 24 hours and all interior locks operate completely offline. Each time a cardholders enters the building, the students’ privileges are revalidated and rewritten to the card granting access for the next 24-hour period. This enables the student to pass through any approved interior door readers. If the individual is fired or expelled, the card will no longer be revalidated at an exterior door and the current privileges on the card will expire at the end of the 24-hour window. Furthermore, as other cardholders enter through the exterior doors and are revalidated, the terminated cardholder data is written to the card for viral distribution. As these valid cards are presented to offline door locks through the normal course of operations, the terminated card is added to the lock’s blacklist. If the terminated card is presented to that lock during the few hours it still has remaining on from its prior validation, access is denied and the card rendered inactive. Benefits From Both Online And Offline Functionality Because SALTO makes all access decisions offline between the card and the reader, the system is not impacted by network or power disruptions. But while the system can function in a fully offline mode, online operation via wireless enables additional functionality. “Princeton opted to connect the interior XSR locks via Wi-Fi to enable real-time audit tracking for access transactions, instantaneous lock down and remote door scheduling,”says Mahon. This also reduces the reliance on revalidation of credentials as terminated cardholders can be removed from the deployed readers via online notification. The university chose to revalidate at different intervals based on group, for example staff once per week, students and faculty once per semester and certain staff every 48 hours, explains Mahon. The new system offers Princeton more flexibility and potentially saves money. In the past, if a key was lost the lock had to be re-keyed. With the new system, however, changes can be made to the physical access control system removing the lost card and issuing a new credential for the student. It also streamlines the process for granting contractors access to residence hall rooms. Physical master keys were assigned or temporarily issued to contractors. The problem with master key-based systems is that lost keys create extreme vulnerabilities and costs. In traditional environments, a lost master key would entail mass rekeying at significant expense. In the new environment, the contractor is issued a card with only the appropriate privileges. If lost, the card is simply canceled and the risk mitigated. The new system also keeps an audit trail of who accessed what locations and when. The new system was two-years in the making, Tuccillo explains. With the start of the Fall semester, students and campus administrators should start reaping the benefits of these efforts to better secure Princeton’s residential facilities.
Learn how the Georgia Tech Police Department deployed a web-based physical access control system (PACS) to manage facility access from any web browser, partition role-based access privileges by building, synchronize with campus-wide identity management systems and reduce total cost of ownership. Managing Campus Facility Access Within A Virtual Server Environment The Georgia Institute of Technology campus occupies 400 acres in the heart of Atlanta, Georgia, with 900 full-time instructional faculty and more than 20,000 undergraduate and graduate students. The Georgia Tech Police Department (GTPD) is responsible for ensuring campus safety and building security 24/7 and is responsible for managing access to more than 1,800 doors across multiple campuses, buildings and parking garages using the Georgia Tech BuzzCard access control system. Download this free case study to learn how the Georgia Tech Police Department implemented a web-based Physical Access Control System (PACS) which provided the following benefits: Manage facility access from any web browser Partition role-based access control privileges by building Synchronize with campus-wide identity management systems Eliminate the cost and complexity of legacy security systems Leverage it investments in hardware virtualization Install non-proprietary door hardware and controllers
Reykjavik University (RU) is a vibrant international university located at the heart of Reykjavik, the capital of Iceland. Reykjavik University is Iceland's largest private university and focuses on research, excellence in teaching, entrepreneurship, technology development and co-operation with the active business community. RU has been happily using HID proximity technology to secure its buildings for many years. About three years ago the university decided to build a larger, more modern and first-rate facility to accommodate all of the university's five-degree courses in the future. Designing this new facility for RU was not an overnight task. Many hours of planning and research were put in to ensure the best possible building for RU. The university's technical manager Ellert Igni Hararson spent almost a year researching the applications and products that may be suitable for RU and in the course of his research, he also met with HID Global at their EMEA offices in Haverhill, UK. To make the new building a success, RU worked closely with Securitas Iceland who, together with the University's building consultant Eiríkur K. Þorbjörnsson, designed a solution to fit the university's vision. RU's vision was to have an almost "key-free" building, not only to increase the convenience and security for students and staff but also to reduce costs and increase efficiency. Whatever solution was to be chosen today needed to also be able to grow and fulfil our future requirements of a high-tech system and building. "Our vision is to have a true multi-application s art card that in the future can be enabled for cashless vending, canteen, on-de and printing, photo ID, library, use of lockers and maybe even more! We are also working with the wider community to extend the use of student cards for public services, such as for buses, the museum and swimming pools. We really would like to see the use of smart cards adopted even beyond the boundaries of the university and make the advantages of multi-application ID cards available to everyone," explains Ellert. Eiríkur adds, "by planning for a true multi-application future from the start, with this project we were able to ensure a quick return on investment for the university." Content with the existing HID PROX® solution and after much research, the university decided to transition to HID iCLASS®, using both multi-technology cards and readers. iCLASS was considered a cost-effective and convenient choice as it made migration to smart cards simple. "From the outset it was important for us that students who were issued access cards for the old building would be able to use their cards and gain access also in the new building", Ellert explains. The university charges students a nominal fee for their cards, which according to Ellert has helped to reduce card loss to almost zero, as students associate value to their cards instantly. The overall system now installed at the university extends the boundaries of access control and has also seamlessly integrated lighting, electrics and room allocation control. "We are trying not only to provide a secure and high-tech facility for our students and staff but to also be green and conscious of our environment around us. Such integrated solutions helps us to learn about how rooms and areas within the university are used, allowing us to become ever more intelligent and efficient",says Ellert. "We are trying not only to provide a secure and high-tech facility but to also be green and conscious of our environment" Today, HID Global's multi-technology's art cards provide about 4000 students access to all the university buildings and by students uploading a photograph to the university's intranet, their card will be issued to the on their very first day of school with all their details and photo already printed on it. "We use a FARGO® HDP5000, which is handled by our receptionists who are able to deliver cards to new students even during the busy periods at the beginning of term", explains Ellert. The cards are used throughout the old and the new buildings to gain access to classrooms, lab rooms and study areas 365 days a year and 24 hours a day. The new ca pus is not yet complete and the current facility is still being extended by another 7000m2, which is planned for completion in August 2010. "Iceland itself is a very-forward thinking country and most of our local and international students have been in touch with s art cards and access control cards before, therefore the adoption of s art cards was very quick and we have received very good feedback from our students and staff so far", says Eiríkur. Ellert and Eiríkur conclude that they are excited about the possible future use and applications of their s art cards, hoping that one day in the not so distant future, the university cards can be used on the local bus, the public library and even at the theatre. "RU has the determination to think big, to always improve the university's ability, and to decisively carry out our plans. We are all responsible for our continued success. The future of RU is in our hands", says technical manager Ellert. "With HID Global solutions, we are set to make our ambitious vision for the future a successful reality today and build on it for the future". For more information on how HID helped Reykjavik University , watch the case study video: Watch the video to see how HID helped upgrade Reykjavik University's security system
Opportunity Located in the heart of the Stratford, Connecticut historic district, St. James School was established 65 years ago to serve the educational, spiritual and social needs of 360 students in grades pre-K through eight. A faith-filled learning community of parents, students, teachers and administrators, St. James is committed to educational excellence, offering small classes, an active extra-curricular program and after-school care. To achieve its academic and spiritual goals, St. James seeks to provide a safe learning environment for students, especially in the wake of the Sandy Hook Elementary School tragedy. “After the shooting at Sandy Hook Elementary School, we began to investigate surveillance solutions more seriously, recognizing the need to make our building safer,” said James Gieryng, Principal, St. James School. The school’s three-story, historic stone building presents physical challenges that make achieving full surveillance coverage difficult. Staff used a single camera installed at the main entrance to control access. “Our local police department conducted a review and exposed a serious gap in our system — we couldn’t tell if there was anyone else positioned outside the camera’s very narrow field of view,” explained Gieryng. Solution The school selected Verint® Video Management Software™ (VMS) to help build a surveillance system that better protects staff and students from potential harm. “With Verint’s management software, we can monitor our entire facility — inside and out — to safeguard our students more effectively,” Gieryng said. To gain broad coverage, St. James School installed 14 analog cameras inside the building and six outside to monitor key areas, including all entrances, the gymnasium, cafeteria, parking lot, and playground. Gieryng, administration staff and the after-school care director use the Verint VMS solution to manage the surveillance system live from their desktops and two large monitors in the main office. The school deployed Verint Virtual Matrix™ to automatically distribute video across its network and allow users to view live and recorded video from their desktops. Up to 30 days of continuous surveillance video can be stored on a network video recorder (NVR). “The improvement in coverage and image quality since deploying Verint’s solutions is significant, making a world of difference in our ability to accurately identify individuals coming and going,” stated Gieryng. Simplicity was a key requirement for the school administrators who use the system. “Ease-of-use is definitely the system’s best feature,” claimed Gieryng. “Using Verint’s advanced search and playback features, such as the interactive map display, it takes just minutes to find footage — and feedback from others indicate the same level of functionality.” Users can view different scenes from multiple cameras at the same time for complete coverage from a single monitor. The school also plans to leverage Verint Virtual Matrix to give local law enforcement access to the system for added security. “Giving police access to our system to help investigate security breaches and threats is a top priority this year,” confirmed Gieryng, who also values the system’s image clarity. “The picture quality is exceptionally clear. I appreciate this more than anything, especially when I compare it to our old camera system.” The improvement in coverage and image quality since deploying Verint’s solutions is significant," says James Gieryng, Principal, St. James School Results The main goal of the new surveillance solution is to improve student and staff safety while at school. “We have several doors throughout the building that are locked at all times, but sometimes, students open them to unidentified visitors to be courteous,” explained Gieryng. “With the Verint surveillance solution, we can easily monitor all the doors, all the time for effective access control.” The school was also concerned about unauthorized access to its fenced-in playground, particularly during after-school hours. Local residents would sometimes bring their children or pets to the playground. “Now under strict surveillance, with clear signage everywhere, we have successfully addressed potential security concerns,” Gieryng explained. The Verint solution also helps improve student behavior. “We have noticed a reduction in horseplay and misconduct because students know they are being monitored,” commented Gieryng. Students also know they need to be honest, because administrators can easily investigate a situation if necessary. In one case, a student accused another of throwing a combination lock at her, which is a serious offense. Upon review, Gieryng was able to confirm that the incident did not occur. “Student behavior has always been very good at St. James, but now it is at an all-time high.” As a private school, St. James works hard to attract new students, and keep existing students engaged and satisfied with their school atmosphere. “With the Verint solution, we can offer students, staff and parents a safe and secure learning environment,” concluded Gieryng. “The Verint solution has become an important marketing tool in our efforts to draw new people to our faith-based community.”
Middleton High School, a new 253,905 - square foot facility, opened in Middleton, Idaho in August 2011. The high school features the newest technology throughout its entire campus, from lighting to computer-controlled heating and air conditioning systems, to wireless communications technology. The newly built school includes a three-story building and a separate vocational facility with workshops and additional enhanced classrooms – all of which incorporate innovative features such as prominent use of skylights to flood the common areas and other parts of the building with natural light, and to lower energy usage. Security was a key consideration when the new school was being planned. Video surveillance at the school involves a system of 112 cameras from Samsung Techwin America that provide views of every part of the campus. The high school uses the video for crime prevention, general security and investigation of incidents. Video views of various parts of the school are also used in emergency situations and for planning by first responders. “The staff and student body were all made aware of the importance of the new camera system during the build-up to the opening of the new school,” said Dr. Richard H. Bauscher, Superintendent of Middleton School District #134, Middleton, Idaho. “The value of the camera system as a tool for crime prevention is undeniable. We simply would not be able to monitor the campus and solve many crimes or policy violations without it.” The new school's video system uses a much larger number of cameras than the system at the old high school (which has been converted into a middle school). Samsung cameras are used throughout the new school to address a variety of security needs. In the student parking area, for example, 3 megapixel cameras combine large-area coverage with system versatility. Real-Time Video Views When designing the video system for the new high school, the district wanted to make it possible for emergency responders to review video of various parts of the school over the Internet. Previously, they had been able to review photographs of various rooms and the school layout as an aid to emergency response. The new fixed, pan-tilt-zoom and megapixel network cameras offer the improvement of providing real-time direct access to video views of the building and surrounding grounds, which will enable better response times and planning for emergency operations. The vast expansion of the new system, compared to the system at the old high school, provides school officials with a much greater variety of camera views. Overall coverage is enhanced and much clearer. The old system only used 11 pan-tilt-zoom cameras outside and 20 indoor fixed mini-domes. For the new high school, the district opted to add many more cameras to cover the large area, including several outbuildings. Middleton administrators chose Samsung cameras and equipment for the new high school because they provide the best combination of security, efficiency and overall value. The school district researched various cameras and found Samsung to provide current, applicable technology at an attractive price point, as well as outstanding customer satisfaction and reliability ratings. Samsung was also highly recommended by CS Consulting Corp., the district's consulting company. The system at the high school was co-designed by Clarence Weiting of CS Consulting Corp.; Deputy Kelley Anderson, the School Resource Officer; and Middleton High School Assistant Principal Spencer Rickart. “We chose Samsung because of overall superior value that combines price, features and versatility,” said Dr. Bauscher. A Solid Investment in Security The Samsung Net-i Viewer is used for monitoring and accessing camera views during playback A total of 112 Samsung cameras are installed at the new school, including 97 fixed cameras, 12 pan-tilt-zoom (PTZ) cameras and three megapixel cameras. The Samsung network fixed dome camera with true day/night functionality provides excellent images in low-light conditions and includes Highlight Compensation to offset bright light sources. The weather-proof (IP66-rated) die-cast vandal-resistant body and tough polycarbonate bubble stand up to weather extremes. The Samsung PTZ network camera is equipped with a 30X optical zoom and 8X digital zoom. The Samsung high performance megapixel network camera includes a 1.3 megapixel progressive CCD sensor that delivers a maximum of 1280 x 960 high-resolution images. The Samsung Net-i Viewer is used for monitoring and accessing camera views during playback. A single PC can monitor up to 32 channels simultaneously in real-time, and the software supports various search and playback options. Two 64-channel Samsung network video recorders are used for recording and making still shots. The high-quality, high-performance network video recorders provide seamless interoperability with the cameras and viewer software. Each NVR has 2 terabytes of storage. The system is viewed locally and through the Internet using iPOLiS software. Return on investment is difficult to quantify, although the overall value of the system to the school system is obvious. “Generally speaking, the return on investment is potentially very high,” said Dr. Bauscher, who allocated funds for the large expenditure because he expects it to be a sound investment. New System Does the Job Just a couple of months after the new school opened, the cameras have already been used as an investigative tool to sort out and resolve several incidents. To date, there have been three traffic accidents in the parking lot and numerous incidents involving students in the hallways. Additionally, the school has had six different cases of theft or vandalism, and the cameras were used each time in the investigation. “The Samsung Techwin America sales team has been very helpful,” said Dr. Bauscher. “They sent representatives to give us instruction on the operation of the system and provided us with contact information and instructions to call them if we had any questions, concerns or problems. They were friendly, professional and knowledgeable.”