Education security applications
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other univers...
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety Search Technology at more than 100 schools, Fulton has in...
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
Located within 10 miles of the U.S.A. - Mexico border on the southern tip of Texas, Harlingen Consolidated Independent School District (CISD) serves most of the cities of Harlingen and Palm Valley, the towns of Combes and Primera, and portions of unincorporated Cameron County, including the communities of Las Palmas-Juarez and Lasana. Over 18,000 students are enrolled in 29 schools across these communities. The school system has seventeen elementary schools, five middle schools, a ninth grade a...
The Customer Located in Brooklyn Park, Minnesota, North Hennepin Community College (NHCC) is one of the largest and most diverse community colleges in the state, serving more than 10,000 students enrolled in 60 degree and certificate programmes. With a rich tradition of excellence in teaching and learning, NHCC offers an exceptional student experience at one of the safest campuses in the country. NHCC’s all-inclusive public safety program includes regular foot and vehicle patrol, set buil...
Customer Butler University is a liberal arts school situated in a residential area, five miles from downtown Indianapolis, Indiana. The University has an enrollment of approximately 4,500 students and offers over 60 major academic fields of study in six colleges. Butler University’s 300 acre campus includes more than 30 buildings as well as a 20 acre garden, an observatory, and water areas. Challenge All universities today are looking for ways to improve physical security in order to p...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly Competitive Landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved Customer Engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance Traditional Security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased Market Growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide Status Updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetizing smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the program, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative Review Team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the program by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Center Director sales are growing for GSA Schedule 84. Advocating For The Security Industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organized paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavor to direct things along when challenges occur or to improve the program. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the center’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilizing the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes In The GSA Program Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical Access Control Products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labor SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates To Guidance For Procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA program for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorized by the manufacturer. GSA Pricing Tool Since the GSA utilizes a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming Challenges For The Security Community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) program that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorized under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 Leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forward The GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernization is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable Tools For Vendor Training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod program have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
In summer 2013, The University of Colorado at Boulder, commonly referred to as CU-Boulder, completed its project to install 5,700 SALTO RFID locks, replacing their previous magnetic stripe locks throughout all of the University’s residence halls. SALTO Systems’ use of RFID technology (Mifare, NFC, Desfire EV1), its robust architecture, and its ease of use all combined to make SALTO the clear choice for the future of CU-Boulder’s residence halls. Increased security awareness, aging infrastructure and pressure to cut operating costs are just some of the many reasons why schools, colleges and universities look to find new ways to enhance campus security. Multi-purpose access control system Student housing in particular is often a key area for upgrade. While each campus housing program is tailored to its individual location, many of the tasks it is required to perform are common across the country. These include assigning rooms, distributing keys, retrieving old keys and issuing new ones, and this can be a time consuming task that can involve large numbers of staff and lengthy waits for students. Then, there is the matter of lost keys and their associated costs which only adds to the workload. Add to this, that older systems used a card that was just a standard key. Today that same card is now almost certainly going to be a student ID card as well as a room key, campus key, and be used for managing in-room energy usage, purchasing food, study supplies, bookstore supplies and riding the bus to class. Being required to handle all this, plus providing facility management (remote lock/unlock, scheduling, access rights) requires a more modern approach to security. It needs an increasingly multi-layered approach that can maximize overall security now, while providing flexible future proof technology that will deliver lasting dollar value for the years ahead. An example of such a multi-purpose access control system installation can now be seen at the University of Colorado Boulder, which has just completed installation of some 3,900 SALTO RFID XS4 keypad locks and 1,800 non- keypad locks. Time to upgrade technology CU-Boulder is the flagship of the four-campus University of Colorado System, which also includes the University of Colorado Denver, University of Colorado Anschutz Medical Campus and University of Colorado Springs. Situated on one of the most spectacular campuses in the country, it offers approximately 3,600 courses in 150 fields of study in arts and sciences, business, education, engineering, environmental design, journalism, law and music. There are currently 26 residence halls on campus at CU- Boulder. The residence hall room types range from singles to four person rooms and others with apartment style amenities. Along with that, there are some rooms that have more amenities than others, including a full bathroom and/or a kitchen. The majority of the students living in the residence halls are freshmen, but any year student can live on campus. There are several communities of residence halls located throughout the campus and in a separate area called Williams Village, which is connected to the main campus via the local bus transit service. SALTO Systems were selected for its use of RFID technology, robust architecture, and ease of use With this in mind, CU-Boulder’s existing magnetic stripe door access system used in the student residence halls was aging and the university wanted to move their locking systems to newer, more secure RFID card technology. A program was initiated by HDS Information Technology Department to evaluate alternative solutions that could offer them both the higher levels of security that they wanted as well as the encrypted RFID technology that could be leveraged for their transit system and other uses on campus. Challenges Larry Drees, Assistant Director HDS Information Technology at CU-Boulder says, “Having used a mix of magnetic stripe door access systems as well as keypad and PIN enabled locks as a part of our residence room standard for many years; we wanted to upgrade our technology, but still have something that was easy to manage. “Our residence halls are busy places with high traffic areas, so any replacement locking system would have to be robust. Encrypted RFID technology was an important requirement for us, but we also wanted something that was reliable and easy to install. Also, we wanted our new system to be capable of integration with our Ecopass transit system and our campus Software House's C-Cure 9000 access control system within the next 12-24 months. In addition, we were impressed with the variety of locking hardware options giving us additional levels of security on a case by case basis while still being capable of management within a single system. After many months of reviewing the options currently on the market, we settled on SALTO’s XS4 solution as the locking system that could give us the functionality and technology options we wanted, at a standalone off-line locking system price point. The ability to transfer information to and from the lock via an RFID card is also something we think will be helpful in managing these locks over the long term.” Planning and installation “Ensuring the safety of students and their assets in residence accommodation is always a high priority,” confirms Tim Moreno, Western Region Sales Manager for SALTO Systems. “Looking at the layout of the campus and the position of the various residence halls, we assessed usage and the level of security required and then worked with Larry and his team to design and subsequently install a highly secure and flexible networked access control system to meet all the needs of the university.” The solution chosen was the SALTO XS4 keypad lock which is designed to provide increased levels of security and control for doors where extra security may be required. It offers users a choice of multiple security authentication methods to control access including RFID smart cards (DESFire EV1 smart cards at CU-Boulder), combined use of a PIN (Personal Identification Number) code + smart card or a separate keypad code. The lock can be operated in 3 modes; smart card only, pin code + smart card or keypad code only. With standard smart card mode, the lock is locked at all times until opened with the student’s key card that has access rights to that room. "Controlling access and securing our residence buildings is crucial. We now have 26 residence halls and 3 administrative support buildings using SALTO locks", says Larry Drees, Assistant Director HDS Information Technology at CU-Boulder When using pin code + card mode, each student has their own personal code. Typically, this is used where extra security and dual authentication (presenting both a card and typing in the pin code) are needed, and students can have up to an 8-digit pin code. In keypad code only mode, the lock itself has an access code that is used for student authentication. Every student that goes through that door knows the keypad code. When two students share the same residence room, they are the only ones that know the keypad code of that room, and again, students can have up to an 8-digit keypad code. “The university also plans to install the SALTO solution into the lobbies controlling the private secure areas of the halls,” Moreno says, “and from a management point of view the XS4 keypad locks can handle up to 64,000 doors and 4,000,000 users on a single system, with each individual lock recording the last 1,000 audit trail events at that door in its memory.” Benefits Larry Drees summarizes, “Controlling access and securing our residence buildings is crucial. We now have 26 residence halls and 3 administrative support buildings using SALTO locks. At this point, we are keeping our system setup pretty simple. Most doors are student rooms which are locked 24/7, and we do not use the calendar features of the system to any great extent at this time. We also plan to work with SALTO to improve the user interface so we can restrict functionality at a more granular level. Now that the system has been implemented, we’re pretty satisfied with the quality and efficiency of the product. Besides helping us move closer to the university’s vision for utilizing RFID technology, the new system also leverages this technology while helping us meet our goal to provide a safe and secure environment for our students.”
Customer: George Mason University is one of Virginia's fastest growing higher education institutions with four campuses and 35,000 students. Located in the heart of Northern Virginia's technology corridor near Washington, D.C., George Mason University offers strong undergraduate and graduate degree programs in engineering, information technology, biotechnology and health care. The George Mason University School of Law has been recognized by U.S. News and World Report as one of the top 40 law schools in the United States. Challenge: The previous video system at George Mason University suffered from poor video quality and a lack of standardization. The legacy system could not provide the needed levels of video surveillance, either related to the area being viewed or the quality of images needed to identify events and/or individuals. A new construction project included the required funds for an initial investment in an IP-based surveillance system. The University needed a system that could provide better video quality to capture facial recognition and to offer a wider range of options. Megapixel Solution: A need for better image quality led George Mason University directly to IP-based megapixel camera technology. The University evaluated several well-known camera suppliers before deciding on Arecont Vision, which leads competitors related to processing power, breadth of the product line, and use of H.264 compression technology to minimize bandwidth and storage needs. "We have installed almost every variety of megapixel camera made by Arecont Vision, from the 1.3 megapixel MegaDome® to the 8 megapixel 360-degree SurroundVideo® panoramic camera," said James L. McCarthy Jr., Director of Physical Security, George Mason University, Fairfax, Virginia. The capabilities of various cameras are matched to the areas they need to cover. Cameras have been installed in athletic facilities, including an Olympic-sized pool; in academic buildings; and in parking garages, according to Brian Piccolo, Senior Account Executive, S3 Integration, Baltimore, Maryland. The system was designed jointly by George Mason University and S3 Integration. Future installations will include the University's residence halls. Two panoramic 360-degree cameras are positioned over a broad plaza area to enable surveillance of activity on the plaza while also covering doors leading into an adjacent building. Each camera's 8 megapixel images (from four 2 megapixel sensors) provide 360-degree coverage from inside a 6-inch dome. The camera is used to view large areas while capturing megapixel detail. Each camera provides up to 6400 x 1200-pixel images at 5.5 frames per second (fps), or can be set for lower resolutions at higher frame speeds, such as 1600x1200-pixel images at 22 fps. The cameras use Arecont Vision's MegaVideo® image processing at billions of operations per second. The cameras also provide image cropping and up to four regions of interest. Several 180-degree cameras cover the pools and gym floors in George Mason's athletic facilities. The 8 megapixel, 180-degree panoramic camera also incorporates four 2 megapixel CMOS image sensors to provide 6400 x 1200-pixel panoramic images at 5.5 fps. Covering long and narrow runs (such as hallways and drives) are 3 and 5 megapixel cameras from Arecont Vision. Arecont Vision's 5 megapixel camera uses a 1/2-in. CMOS sensor to provide 2,592 x 1,944-pixel images at 9 frames-per-second. Light sensitivity is 0.3 lux at F1.4. The camera can output multiple image formats, allowing the simultaneous viewing of the full-resolution field-of-view and regions of interest for high-definition forensic zooming. Arecont Vision's 3 megapixel camera provides 2048 x 1536-pixel images at 15 frames per second. Light sensitivity is 0.2 lux at F1.4. The images from Arecont Vision's IP megapixel cameras are fed to a local ExacqVision network video recorder, which is monitored by a Central Security Operations Centre The images from Arecont Vision's IP megapixel cameras are fed to a local ExacqVision network video recorder, which is monitored by a Central Security Operations Center. Signals from some of the cameras are also fed to a central server that have been downloaded with Exacq software. All video data is transmitted over a secured, firewalled, standalone security network within the George Mason University intranet system. The majority of the Arecont Vision cameras are placed in areas where there is sufficient light at all times. Parking garages are currently monitored with Arecont Vision day/night cameras, which use a motorized infrared (IR) cut filter. These cameras can monitor license plate numbers and increase the productivity of garage personnel by monitoring daily tasks like: credit card transactions, remotely. Now, any George Mason University department that wants to add video surveillance can call on S3 Integration to upgrade and expand the system using funds provided through departmental budgets. Megapixel Benefits: "Advantages of Arecont Vision cameras over competitive products include performance, versatility, price and ease-of-use," said Mr. Piccolo. The end-user customer especially likes the ease-of-use and the sharp pictures available from the various Arecont Vision models. "The price point was better and [the cameras] helped eliminate some costs," said Mr. Piccolo. "We now have better forensic capabilities and more flexibility in the recovery of data," added Mr. McCarthy. The main attribute of the Arecont Vision camera line is the ability to install fewer cameras while capturing video from a larger area. Fixed megapixel cameras providing virtual pan-tilt-zoom (PTZ) within captured images translates into fewer moving parts than traditional PTZ systems, which reduces overall maintenance cost and the potential for system failure. The picture quality and digital zoom capabilities of Arecont Vision cameras far exceed analog technology and allow George Mason University to retrieve usable video. Combined with recent cost reductions in NVR storage and network switches, the use of fewer cameras allows George Mason University to transition to higher-quality video at a minimum increase in cost. Megapixel imaging represents a significant upgrade in system functionality compared to standard-resolution cameras. In addition to lower bandwidth and storage requirements, using fewer megapixel cameras to cover larger areas can dramatically decrease costs related to other elements of a system, such as fewer software licenses, fewer lenses, and a decrease in man-hours needed to install the system.
The Muhammad Ali Center is a cultural attraction / international education center inspired by the ideals of its visionary founder, Muhammad Ali. Featuring two-and-a-half levels of interactive exhibits and captivating multimedia presentations, the Ali Center carries on Ali's legacy and inspires the exploration of the greatness within ourselves. It includes a five-screen orientation theater, timeline of Ali's life, historical Civil Rights era and fight footage, exhibit galleries, and hands-on boxing fun. It also includes an Ali Center retail store and lunch café. The Ali Center has over 30 cameras protecting the museum and its 3-level underground parking garage. The existing surveillance system transmitted analog video 800 to 1200 ft over traditional coax cable to the control room. To improve image resolution and flexibility, the museum decided to upgrade to a new IP-based system. The project was not as straightforward as initially thought. Budgets had to be met and facility disruptions kept to a minimum. To perform the upgrade the Ali Center turned to Tyco Integrated Security. After a careful site plan review, Tyco Integrated Security recommended the NVT Ethernet over Coax (EoC) solution based on past successes at other customer sites because: Re-deployed coax eliminates the expense for pulling out old cable and the installation of new network wiring; There would be zero facility disruption; Power-over-Ethernet signals are easily delivered at extended distances without the need for mid-span repeaters or IDF wiring closets. Successful deployment experiences at other Tyco customers’ sites. In selecting the NVT Ethernet over Coax solution, the Ali Center was able to install a cost-effective state of the art surveillance upgrade, using existing cable at extended distances with no disruption to visitor enjoyment of the facility.
The contactless readers on the front of the dorms remain the same, but instead of being issued keys for access to specific rooms students will now taptheir card and enter a PIN for access, says Keith Tuccillo, system administrator for life safety and security systems at Princeton. Deployment At Princeton’s Housing Facilities Using technology from SALTO Systems, the massive deployment includes 53 residence halls and 3,700 individual locks. It impacts about 9,000 undergraduate and graduate students living in Princeton’s housing facilities. Previously students would tap their HID iCLASS 32K card at the main entrance and then use a key for access to their rooms, Tuccillo explains. Starting in the fall, after students are through the main entrance they tap the card on a reader and enter a PIN to access their room. “The housing department wanted something more robust,” says Trucillo, explaining the choice to require both contactless read and PIN entry. They wanted two-factor authentication so that if a student lost an ID card someone could not gain access to their room, he explains. To meet this need, Princeton chose SALTO’s XS4 lock with keypad. For added security, the campus is assigning PINs rather than allowing students to self-select their own. “This is to avoid students choosing 1-2-3-4 as their PIN,” Tuccillo says. Students have been notified of their PIN and the changes to the physical access control system through email, physical mail and other print materials. The Data On Card Concept “In a SALTO system, all data required to make an access decision is held on the card,” explains Mike Mahon, Senior VP Commercial Sales, SALTO Systems. The lock and card communicate with each other to determine if access should be approved or declined. This eliminates the need for online connectivity to a central database during access transactions. In addition, Mahon explains that the cards themselves can act as transport, carrying system data throughout the network of readers. Cards pickup data from readers in the normal course of entries and exits and spread this data to other readers in a viral manner during subsequent transactions. This Data on Card concept is a key part of what SALTO calls the SALTO Virtual Network. Another key component is the series of online readers known as hotspots. At a hotspot, cards can be revalidated, PINs changed and access rights adjusted. Additionally, important system data can be loaded for viral dissemination. Hotspots can be normal online exterior door readers or they can be dedicated stations, conveniently located within a building. Revalidation of card privileges at hotspots is crucial to the SALTO Virtual Network architecture. In traditional online access control systems, cards and privileges are revoked. Access rights for a terminated employee or student are turned off in the central system and all subsequent access requests are declined during the online transaction. But this presents a challenge in offline environments, as the removal of rights for a terminated cardholder cannot be communicated immediately to the deployed readers. SALTO solved this challenge by reversing the traditional access control model. “Rather than granting privileges with no expiration or extremely long life spans, we grant short term privileges and use the power of our hotspots to facilitate rapid, seamless revalidation,”explains Mahon. "Princeton opted to connect the interior XSR locks via Wi-Fi to enable real-time audit tracking for access transactions" Imagine a building with two exterior doors and two hundred interior doors controlled with SALTO locks. Cardholder privileges are set to expire every 24 hours and all interior locks operate completely offline. Each time a cardholders enters the building, the students’ privileges are revalidated and rewritten to the card granting access for the next 24-hour period. This enables the student to pass through any approved interior door readers. If the individual is fired or expelled, the card will no longer be revalidated at an exterior door and the current privileges on the card will expire at the end of the 24-hour window. Furthermore, as other cardholders enter through the exterior doors and are revalidated, the terminated cardholder data is written to the card for viral distribution. As these valid cards are presented to offline door locks through the normal course of operations, the terminated card is added to the lock’s blacklist. If the terminated card is presented to that lock during the few hours it still has remaining on from its prior validation, access is denied and the card rendered inactive. Benefits From Both Online And Offline Functionality Because SALTO makes all access decisions offline between the card and the reader, the system is not impacted by network or power disruptions. But while the system can function in a fully offline mode, online operation via wireless enables additional functionality. “Princeton opted to connect the interior XSR locks via Wi-Fi to enable real-time audit tracking for access transactions, instantaneous lock down and remote door scheduling,”says Mahon. This also reduces the reliance on revalidation of credentials as terminated cardholders can be removed from the deployed readers via online notification. The university chose to revalidate at different intervals based on group, for example staff once per week, students and faculty once per semester and certain staff every 48 hours, explains Mahon. The new system offers Princeton more flexibility and potentially saves money. In the past, if a key was lost the lock had to be re-keyed. With the new system, however, changes can be made to the physical access control system removing the lost card and issuing a new credential for the student. It also streamlines the process for granting contractors access to residence hall rooms. Physical master keys were assigned or temporarily issued to contractors. The problem with master key-based systems is that lost keys create extreme vulnerabilities and costs. In traditional environments, a lost master key would entail mass rekeying at significant expense. In the new environment, the contractor is issued a card with only the appropriate privileges. If lost, the card is simply canceled and the risk mitigated. The new system also keeps an audit trail of who accessed what locations and when. The new system was two-years in the making, Tuccillo explains. With the start of the Fall semester, students and campus administrators should start reaping the benefits of these efforts to better secure Princeton’s residential facilities.
Learn how the Georgia Tech Police Department deployed a web-based physical access control system (PACS) to manage facility access from any web browser, partition role-based access privileges by building, synchronize with campus-wide identity management systems and reduce total cost of ownership. Managing Campus Facility Access Within A Virtual Server Environment The Georgia Institute of Technology campus occupies 400 acres in the heart of Atlanta, Georgia, with 900 full-time instructional faculty and more than 20,000 undergraduate and graduate students. The Georgia Tech Police Department (GTPD) is responsible for ensuring campus safety and building security 24/7 and is responsible for managing access to more than 1,800 doors across multiple campuses, buildings and parking garages using the Georgia Tech BuzzCard access control system. Download this free case study to learn how the Georgia Tech Police Department implemented a web-based Physical Access Control System (PACS) which provided the following benefits: Manage facility access from any web browser Partition role-based access control privileges by building Synchronize with campus-wide identity management systems Eliminate the cost and complexity of legacy security systems Leverage it investments in hardware virtualization Install non-proprietary door hardware and controllers
Reykjavik University (RU) is a vibrant international university located at the heart of Reykjavik, the capital of Iceland. Reykjavik University is Iceland's largest private university and focuses on research, excellence in teaching, entrepreneurship, technology development and co-operation with the active business community. RU has been happily using HID proximity technology to secure its buildings for many years. About three years ago the university decided to build a larger, more modern and first-rate facility to accommodate all of the university's five-degree courses in the future. Designing this new facility for RU was not an overnight task. Many hours of planning and research were put in to ensure the best possible building for RU. The university's technical manager Ellert Igni Hararson spent almost a year researching the applications and products that may be suitable for RU and in the course of his research, he also met with HID Global at their EMEA offices in Haverhill, UK. To make the new building a success, RU worked closely with Securitas Iceland who, together with the University's building consultant Eiríkur K. Þorbjörnsson, designed a solution to fit the university's vision. RU's vision was to have an almost "key-free" building, not only to increase the convenience and security for students and staff but also to reduce costs and increase efficiency. Whatever solution was to be chosen today needed to also be able to grow and fulfil our future requirements of a high-tech system and building. "Our vision is to have a true multi-application s art card that in the future can be enabled for cashless vending, canteen, on-de and printing, photo ID, library, use of lockers and maybe even more! We are also working with the wider community to extend the use of student cards for public services, such as for buses, the museum and swimming pools. We really would like to see the use of smart cards adopted even beyond the boundaries of the university and make the advantages of multi-application ID cards available to everyone," explains Ellert. Eiríkur adds, "by planning for a true multi-application future from the start, with this project we were able to ensure a quick return on investment for the university." Content with the existing HID PROX® solution and after much research, the university decided to transition to HID iCLASS®, using both multi-technology cards and readers. iCLASS was considered a cost-effective and convenient choice as it made migration to smart cards simple. "From the outset it was important for us that students who were issued access cards for the old building would be able to use their cards and gain access also in the new building", Ellert explains. The university charges students a nominal fee for their cards, which according to Ellert has helped to reduce card loss to almost zero, as students associate value to their cards instantly. The overall system now installed at the university extends the boundaries of access control and has also seamlessly integrated lighting, electrics and room allocation control. "We are trying not only to provide a secure and high-tech facility for our students and staff but to also be green and conscious of our environment around us. Such integrated solutions helps us to learn about how rooms and areas within the university are used, allowing us to become ever more intelligent and efficient",says Ellert. "We are trying not only to provide a secure and high-tech facility but to also be green and conscious of our environment" Today, HID Global's multi-technology's art cards provide about 4000 students access to all the university buildings and by students uploading a photograph to the university's intranet, their card will be issued to the on their very first day of school with all their details and photo already printed on it. "We use a FARGO® HDP5000, which is handled by our receptionists who are able to deliver cards to new students even during the busy periods at the beginning of term", explains Ellert. The cards are used throughout the old and the new buildings to gain access to classrooms, lab rooms and study areas 365 days a year and 24 hours a day. The new ca pus is not yet complete and the current facility is still being extended by another 7000m2, which is planned for completion in August 2010. "Iceland itself is a very-forward thinking country and most of our local and international students have been in touch with s art cards and access control cards before, therefore the adoption of s art cards was very quick and we have received very good feedback from our students and staff so far", says Eiríkur. Ellert and Eiríkur conclude that they are excited about the possible future use and applications of their s art cards, hoping that one day in the not so distant future, the university cards can be used on the local bus, the public library and even at the theatre. "RU has the determination to think big, to always improve the university's ability, and to decisively carry out our plans. We are all responsible for our continued success. The future of RU is in our hands", says technical manager Ellert. "With HID Global solutions, we are set to make our ambitious vision for the future a successful reality today and build on it for the future". For more information on how HID helped Reykjavik University , watch the case study video: Watch the video to see how HID helped upgrade Reykjavik University's security system