Healthcare security applications
GX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-DT35B can be compatible with Bluetooth medical devices, like blood gluc...
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations...
St. James Hospital in Dublin, Ireland, which has more than 1,000 beds, is a teaching hospital that specializes in not only treatment but health promotion and preventative services at its central location. It is also a central location for the treatment of COVID-19 patients. Tasked with keeping patients and staff safe from the threat posed by the COVID-19 pandemic, St. James Hospital needed a way to add additional screening capabilities to its facility alongside its existing access control termi...
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threat...
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys...
Combating the COVID-19 (coronavirus) pandemic is at the top of the global agenda and providing vaccine to populations around the globe means providing around 8 billion doses - with only one for every person in the world. In addition to the availability of the vaccine, a decisive factor in the race against time is the disposability of the glass vials. Medical-grade vaccine vials The glass must be resistant to a wide range of chemicals and temperature changes To ensure that the mass vaccination against the coronavirus does not fail because of the container, the producers of the vials are massively ramping up their production so as not to become the proverbial bottleneck in the supply chain. However, medical-grade vaccine vials are not standard glass tubes. Whether rolled-rim bottles, threaded bottles or ampoules, they are all made of the special glass borosilicate and require customized production lines. The glass must be resistant to a wide range of chemicals and temperature changes and must not contaminate medicines, for example. Industrial cameras Any interaction between the container and the liquid inside must be prevented, as any chemical interference could affect the vaccine. Even the smallest scratch, crack or fissure can render an entire batch unusable, contaminate the line during the filling process or even lead to a machine standstill. The demands on manufacturers are enormous. It is not only a matter of producing large quantities quickly, but also of maintaining particularly high quality standards. Industrial cameras from IDS Imaging Development Systems GmbH in Germany are currently becoming key components in demand. In an intelligent multi-camera system for the quality control of vaccine bottles from Isotronic GmbH, they take care of the image acquisition. High-speed processing When increasing production capacities, efficient solutions that can be integrated quickly are in demand. The ‘VialChecker’ developed by Isotronic GmbH meets this growing demand exactly. “Our system enables high-speed processing and is usually used at several points in the production line,” explains Gregor Fabritius, Managing Director at Isotronic GmbH. The system works with up to eight cameras per unit, the camera models vary depending on the requirements of the respective control task. For example, they observe the laterally rotating tube glass or the glass bottom and provide high-resolution images. Intelligent software Intelligent software enables accurate fault description analysis and classification “The IDS cameras capture at least 20 images per rotation, allowing up to 120 vials per minute to be inspected for dimensional accuracy or surface condition with very high precision,” emphasizes Valentin Mayer-Eichberger, Chief Operating Officer (COO) at Isotronic. Accuracy is up to 0.01 millimeters for dimensional testing. Defects such as cracks, scratches, chips, inclusions or stains, on the other hand, are detected with an accuracy of 0.1 square millimeters thanks to the powerful cameras. Intelligent software enables accurate fault description analysis and classification. High-performance testing systems Experts estimate that global demand for vaccine vials will further increase by one to two billion over the next two years. To ensure that this valuable liquid is protected accordingly, automatic, high-performance testing systems are more in demand than ever to guarantee the immense demand for quality. “We think that we are meeting a growing demand here with our cameras and are pleased to be able to make a corresponding contribution to combating the pandemic,” explains Jan Hartmann, Managing Director at IDS Imaging Development Systems.
Planning elderly care involves thinking about the long term. Building and managing residential homes with a sustainability ethos is increasingly important - to local governments and private providers. Security technology decisions can have an impact on whether they succeed. Tegs Äldrecenter in Umeå, Sweden, chose an access control solution from Tidomat including around 100 ASSA ABLOY Aperio locks wirelessly integrated with the system. Aperio locks are battery powered and operate without any connection to mains electricity. As well as enabling center residents to move around in safety and convenience, Aperio helps the care facility reduce its daily energy consumption. “With Aperio we offer our customers energy savings and extended access control in one,” says Lennart Eriksson, Tidomat’s CEO. Access control report The World Green Building Council identifies energy efficiency as an essential feature in any “green building”. The appetite for investing in this and other sustainability-friendly improvements is growing. In one recent access control report, “findings suggest sustainability is now a major consideration when it comes to procurement.” Aperio wire-free locks are cost-effective to install and run more than traditional electronic door security" A survey for the recent Euromonitor publication “Rethinking Sustainability” identifies the focal points for these investments over the coming five years. Both “energy” and “sustainable sourcing” are high on the priority list. A recent benchmarking study estimates that choosing wireless over wired locking can reduce operating energy consumption, and therefore costs, by around 70%. Electronic door security “Battery-powered electronic locks with inbuilt RFID readers are a cost-effective way to upgrade existing access control and bring it to more doors,” says Lars Angelin, Business Development Manager for Wireless Locks at ASSA ABLOY Opening Solutions EMEA. “Our Aperio wire-free locks are much more cost-effective to install and run than traditional electronic door security.” Tegs’ energy-efficient Aperio installation is flexible and future-proofed. Because Aperio locks are modular and scalable on-demand, Umeå Social Services can bring more facilities into the same access management system whenever required at a later date. Wireless locks typically enjoy a longer lifetime, too: they can usually be moved if building spaces are reconfigured or doors are repositioned - unlike wired locks which are installed and cabled invasively. Maintenance requirements for wire-free locks are minimal: all they need is a new standard battery every 2 years (on average).
Dahua Technology, with its award winning deep learning algorithms, proudly releases WizMind – a portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, thermal and software platforms, delivering precise, reliable and comprehensive AI solutions to verticals including government, retail, energy, finance and transportation. WizMind's human-oriented solutions Powered by AI and deep learning algorithms, WizMind provides comprehensive human-oriented solutions including facial recognition, privacy protection, human video metadata, people counting and stereo analysis, enabling rapid and precise reaction. In addition, it provides more precise and effective AI search to locate targets, generating various human data for business analysis. According to IHS, the total market value of professional video surveillance equipment will grow to $27.2 million by 2023 To protect portrait data, WizMind provides outstanding privacy protection. Based on deep learning algorithms, WizMind supports real-time mosaic masking of the human face or body detected in the monitoring area, which is needed in courtroom scenarios and may be valuable to retailers which can optimize their business through intelligent analysis of customer flow, recorded without violating privacy or GDPR. WizMind based on vehicles WizMind boasts multiple vehicle-based AI solutions, such as ANPR and vehicle metadata, illegal parking which provide more attributes of vehicles for easy control, quick search and business analysis. It is widely used in urban areas, residential community entrances, parking lots and toll stations. By extracting and comparing plate numbers with databases, ANPR helps managers of parking lots and city roads improve vehicle management efficiency with functions like Blacklist Alarm and VIP Recognition. ANPR also supports vehicle tracking, which helps police efficiently locate vehicles according to the crosschecking result. ANPR is able to recognize plate numbers in over 58 countries. WizMind with thermal technology WizMind combines deep learning algorithms with thermal imaging technology to help users achieve ultra-long-distance monitoring in harsh environments, non-contact temperature monitoring and early fire prevention. The Dahua WizMind series is compatible with mainstream third party technology partners With an accuracy of 0.3 degrees Celcius and a speed that monitors three people per second, Dahua’s High Accuracy Body Temperature Monitoring Solution has been widely and successfully applied within transportation hubs, financial institutions, commercial complexes, schools and other places all over the world, joining the global efforts in pandemic prevention and control. WizMind Ecosystem Initiating openness and collaboration, the Dahua WizMind series is compatible with mainstream third party technology partners, such as Milestone, AxxonSoft, ISS and others. Furthermore, WizMind Ecosystem provides the DHOP and sufficient API for our technology partners, enabling them to combine real AI joint solutions to our common customers, and a series of marketing activities will be engaged with our ecosystem partners. Dahua WizMind, a high-end AI series, aims to serve demanding scenarios in many vertical industries. With the mission of “enabling a safer society and smarter living”, Dahua Technology will continue to focus on “innovation, quality and service” to serve its partners and customers around the world.
Due to the escalating coronavirus pandemic (COVID-19), Messe Frankfurt New Era Business Media Ltd and ABEC Exhibitions and Conferences P Ltd, have decided that Secutech India will not take place in 2020. The decision is the result of travel restrictions and strict social distancing guidelines currently in place across India, and a lack of availability at the fair’s venue – the Bombay Exhibition Centre – during an appropriate time later this year. The fair will take place at the same location in Mumbai in May 2021. Stemming the spread of COVID-19 The Indian Government has taken extensive measures to stem the spread of COVID-19. Beginning from March 25, a 21-day nationwide lockdown was announced, effective until April 14. This has since been extended for another 19 days, effective until May 3. Strict social distancing regulations have been imposed, and all incoming and outgoing international and domestic flights have been suspended. With uncertainty and tight travel restrictions in place not only in India, but around the globe, pre-fair planning and preparations for Secutech India, originally scheduled from May 7 – 9, 2020, were severely hindered for the fair’s exhibitors and visitors. The decision to defer to 2021 Commenting on the cancellation, Ms Regina Tsai, General Manager of Messe Frankfurt New Era Business Media Ltd, said: “The evolving situation, including local and international travel restrictions as well as constantly changing public health guidelines made it impossible for the fair to be held as scheduled. Despite our best efforts, we have been unable to find a new available time slot at the fair’s venue to adequately serve the interests of our exhibitors in 2020. Because of this, we have taken the difficult decision to defer the fair until 2021.” Mr Manish Gandhi, COO, ABEC Exhibitions & Conferences P Ltd, further commented: “As members of an industry that prioritises safety and security, we are confident that the industry is in full support of our decision. We remain committed to supporting the business of our stakeholders wherever possible, and we look forward to welcoming the full fraternity for another productive few days of trade in 2021."
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-Permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organization’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organizations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practiced in most modern office spaces, with it recognized as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organization leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behavior represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behavior represent a true security risk to organizations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offices and other workspaces will be tasked with supporting a hybrid work solution, as well as increasing hygiene measures. Video intercom solution This is where an IP video intercom solution can assist. Below are four ways they can help usher in a smarter, safer work environment: Video intercoms assist in creating a more hygienic work environment - The outbreak of COVID-19 has raised awareness of germs and just how easily a virus can be transmitted by face-to-face contact. Germ barriers are popping up in many aspects of our daily lives, where we were not likely to see them before Unfortunately, the door is also the easiest of these germ barriers to breach As such, we’re becoming accustomed to seeing plexiglass barriers at restaurants, grocery stores, and even coffee shops. However, many don’t realize that one of the best germ barriers is a simple door. Unfortunately, the door is also the easiest of these germ barriers to breach. All it takes is a knock or a doorbell ring to make us open our germ barrier and be face-to-face with whomever is on the other side. Increasing hygiene safety A simple step to increase hygiene safety and visitor security in commercial buildings and workspaces is an IP video intercom. Installing a video intercom will allow staff to see and speak with visitors without breaching that all-important germ barrier. A video intercom system provides a first line of defense, enabling the user to visually confirm the identity of the person on the other side of the door first before granting access. It can also be used to make sure proper procedures are being followed before a person is allowed to enter, such as using hand sanitizer, wearing a mask, and following social distancing guidelines. Basic security needs A major topic of conversation the past year has been how to manage occupancy in all facilities Video intercoms for occupancy management and basic security - A major topic of conversation the past year has been how to manage occupancy in all facilities—ranging from grocery stores and retail shops to restaurants and commercial buildings. Workspaces and offices are no exception. A video intercom provides a quick and convenient method of seeing who, or what, is on the unsecure side of the door before opening. For basic security needs, if a business has a door opening into an alley, a video intercom would be used to ensure no one is waiting outside to force their way in when the door is opened. Personal protection equipment Such solutions can also be used to ensure a person is carrying proper credentials, or wearing proper personal protection equipment (PPE), before entering a sensitive area. For example, if a lab has a room which can only be accessed by two persons at a time wearing specific protective gear, a video intercom could ensure each person is properly equipped, before allowing access that particular room. Additionally, for office or workspaces that have shared common areas, such as a cafeteria, gym or even conference rooms, managing access to these spaces will remain a priority, especially with post-pandemic restrictions in place. Video intercoms are a comprehensive safety and security tool for any workspace Deliveries of packages, work-related materials, or even food are common in any office or workspace. Video intercoms can assist in facilitating safe deliveries by visually and audibly confirming the identity of the individual. The visitor could be your next big client, your lunch delivery, a fellow employee with a faulty access card, or your mail. Video intercoms are a comprehensive safety and security tool for any workspace. Visitor management systems Video intercoms provide a cost-effective solution in small to mid-sized office facilities - One significant advantage of video intercom systems is the variety of applications available. Systems range from simple one-to-one video intercoms, to buzz-in systems, to full-fledged visitor management systems in mixed-use buildings. While they might lack the resources and manpower many enterprises have, small-to medium-sized offices can also take steps to ensure the safety of their staff and customers. Like any business, controlling who comes into the building is a primary way of maintaining safety. Video intercoms work in conjunction with access control systems to provide an identifying view of visitors or employees with lost or missing credentials. They allow staff to both see and hear those on the unsecured side of the door to determine intent before granting access. Most quality video intercoms will provide a clear enough image to allow an identification card to be read by holding it close to the lens, adding another opportunity to verify identity. Touchless intercom activation One major trend is the option of providing a touchless door activation Video intercoms provide a touchless option - Even prior to COVID-19, one major trend is the option of providing a touchless door activation or touchless intercom activation of a video intercom for those without proper credentials. Though touchless isn’t a new solution to the access control market, the pandemic introduced a renewed focus on these types of solutions to provide hygienic access to visitors. For offices and other workspaces looking to make investments into post-pandemic solutions to assist in reopening, touchless can support these efforts. When it comes to smart, secure workspaces, many people think instantly of cameras or monitors, access control, and alarm systems. Proper access credentials However, video intercoms are often the missing piece of a building’s security puzzle. A video intercom provides an identifying view that is not always available from a camera covering a large area. They allow those without proper access credentials a method of requesting entry, and just like cameras, they can be activated by alarms to allow staff to clearly see and communicate. If a workspace or office is important enough to be secure, it’s important enough to be sure of who is there before the door is opened. In 2021, it’s not enough to ensure the physical security of your staff and visitors, but also to ensure they are accessing a hygienic environment. Video intercoms provide that security and peace of mind.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry). The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market. The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg. Tesla amongst those impacted The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012. In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.” Hacking was possible due to built-in feature The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature. Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking." "Connected cameras are supposed to provide an additional layer of security to organizations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.” Super Admin account had access to all cameras Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.” Impact on broader video surveillance industry The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.” Widespread government and healthcare use The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organization to find relevant footage. The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasizing barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimization. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle traveling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilize portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no longer an option. Instead, a single, all-encompassing security platform should deliver connectivity, convenience and simplicity, keeping one’s premises secure and filtering access to manage the ever-changing movement of people. This is where Incedo Business comes in: a new solution for all types of premises, handling security while leaving one free to focus on growing the business. Incedo ensures employees, customers and goods are where they need to be. Incedo makes life and tasks easier and more efficient for everyone, from installers to end users. Facility managers enjoy more control and flexibility than they ever thought possible, maximizing return on investment, with Incedo Business able to scale quickly when needed. System administrators can do more within available budgets: initiating, cancelling or amending access profiles, and monitoring movement around their site in real time. Building users, meanwhile, get the individual access times and entry permissions they need. They can move freely without compromising the security of other people and equipment. Integrators can upgrade connected technologies and systems quickly, minimizing risk and meeting customers’ raised expectations of modern technology. Installers no longer need to wrestle with incompatible systems: easy interoperability is built into Incedo, meaning no more delays or unnecessary complexity. With Incedo’s modular platform approach, one simply chooses the security hardware and credentials one needs and the appropriate management system option. One can set exactly who can access which doors, and when, from the user-friendly Incedo Business software interface. When Incedo Business launches, one can pick the most suitable options from a growing range of Incedo-enabled security and access control hardware. Road-tested, award-winning ASSA ABLOY wireless digital locks and wired ASSA ABLOY wall readers secure all interior and exterior doors. Also already available, a choice of card and token credentials helps users enjoy safe and convenient access to, and movement around, the premises. Incedo mobile keys add the flexibility to open doors with a smartphone. Incedo’s system management options, Lite, Plus and Cloud, scale from entry level up to cloud-based administration. One can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand, or switch system management options, all within a single environment. Migration between Lite, Plus and Cloud options is always seamless in any direction, ensuring total flexibility for the business. Incedo moves with you, today and in the future However your business moves, an Incedo system moves along. Having a flexible platform, able to adapt as the organization changes, reduces total cost of ownership: one never needs to retrain staff or start over from scratch. New Incedo-enabled hardware from ASSA ABLOY and third-party providers will continue to be connected to, and made available within, the evolving Incedo platform. One picks the hardware and software configuration one wants, and can change one’s mind as often as one likes. Incedo guarantees flexibility and scalability in every way, to meet the security needs today and in the future. And because the security and operational challenges at a university, small hotel or hospital are not the same as those faced by a public building or corporate HQ, the Incedo ecosystem will introduce new, advanced user interfaces for the specific industry. “Incedo Business transforms the experience of using and managing a building. It is also the seed from which our revolutionary Incedo ecosystem will grow in the months and years ahead,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “A future where doors are smarter, connectivity and movement are seamless, and access management is genuinely intelligent. This is our vision for Incedo and for those who will be using it.” Incedo™ Business embodies ASSA ABLOY’s vision to create a safer and more open world, keeping everyone on the move. Together. To learn more and download a free solution guide, visit https://campaigns.assaabloyopeningsolutions.eu/Incedo-business
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage. The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with oneself. Filtering access intelligently and dynamically has become part of security’s job description. Yet there is no need to dispose of the key altogether. One can adapt it, rather than throw it out. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys, familiar and user-friendly… but evolved. When the key has a brain, one can do more with less. These efficiencies are critical in a world where demands on the public institutions are at levels not seen in generations. Cut workload and solve the problem of lost keys One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys" Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive rekeying and reissuing to relevant keyholders are complex and expensive. Programmable keys, however, solve the problem quickly. The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too, at great expense. Key duplication costs were mounting. “One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre. To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system. Now lost or stolen electronic keys are cancelled instantly using secure cloud software which works inside a standard browser, no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filtre access to specific sites and doors according to the precise requirements of every municipal employee. Keep residents safe in their homes In Aalborg, Denmark, around 3,000 citizens in home care have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents. Certified technicians simply replaced each old cylinder with a programmable cylinder If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement — keeping the keyholder’s home safe and saving the city time and money on rekeying. Managing Aalborg’s system is straightforward. Lock installation was quick and easy: certified technicians simply replaced each old cylinder with a programmable cylinder — with no wiring and no major alterations to the door. Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grant or revoke access, and tailor permissions for different users or locations according to defined needs. In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets.More rapid response means a better chance to prevent a fire spreading Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire. When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key. More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, Skellefteå residents at home and firefighters at work. Clear workflow bottlenecks in public housing With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant. However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay. Security managers issue the precise permissions which every staff member needs At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process. Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs. The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys, and the time and money spent coordinating this process, has been eliminated. Preserve the fabric of historic buildings, and the design integrity of new spaces Building type can make a big difference to the access control one chooses. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control. Here, wireless electronic cylinders which simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. Intelligent key security is hardly noticeable for the library’s many visitors The issue of aesthetics also affects modern public spaces, albeit differently. In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium four storeys high, and public entrances on all four sides. Almost as soon as it opened, the building was declared an architectural icon — “instantly one of the world’s most beautiful libraries.” Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage Save time and money managing keys for a mobile workforce Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights. With a Bluetooth-powered solution, everyone carries their own programmable key Mobile workers use more fuel and increase a carbon footprint. One makes a business more sustainable quickly if one reduces the mileage one travels. Reducing miles while maintaining security is not easy, if one relies on mechanical keys to secure remote or dispersed sites. Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key. With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app — meaning fewer miles driven and less money wasted on unnecessary fuel. One technology powers all the solutions All the installations referenced above — and many, many more across the full spectrum of public services — run on the same technology: CLIQ® from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks. CLIQ locks are installed without wires: every cylinder’s power is supplied by a battery inside the CLIQ key. These keys are physically identical and programmable by a system administrator using a desktop updater; by keyholders with a portable programmer; or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff. Intuitive software makes it simple to manage access rights, enable and disable keys and customise access schedules, on site or on the go. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. Challenges First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real-time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras are integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles, and statistics can be managed. Video recorder MXVR6212 supports real-time vehicle location tracking and monitoring, GPS and video can be uploaded via a wireless network Each bus is equipped with a Penta-hybrid video recorder MXVR6212, 4, 6, or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board, and geo-localization via the DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via a wireless network – 3G/4G/WIFI. In addition, the device can also support the connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than the city bus, this device can be used in various applications, such as school buses, taxis, police cars, trains, trucks, etc. Mobile camera The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high-quality images and ensures real-time transmission. Also, it adopts a high-performance sensor to provide incomparable performance even under extreme lowlight environment. The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. DSS platform At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering, and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize the driving route to generate more profit. Benefits With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real-time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operations. The Dahua mobile solution mounted onboard has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the leading camera and video management software (VMS) solutions, but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. 360-degree fisheye camera Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection.Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Collins said Adirondack Direct has long recommended Genetec’s Security Center for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organizations through enhanced situational awareness, unified command and control and connectivity to the cloud. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed Business intelligence While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgement-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behavior. Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it.Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Gentec video solution. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Potential medical emergencies Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Break room sensors Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can reorient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.”If an employee visits the break room too often, Planet Fitness management can reorient that employee on the proper policies and procedures A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realizing it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciate by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgement free zone where people can do their own thing.”
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the center also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project. Providing comprehensive coverage All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS). All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback. Automatic object detection The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach. Each camera is set to perform virtual guard tours at specific times throughout the day and night IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognize and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role. Access to advanced features and functionality Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient. The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralized control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site. Authorized monitoring and access of footage IDIS technology made this easy, and it was also the quickest and least disruptive to install Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents. Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorized monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO). Ensuring better safety and security Replacing the centre’s aging camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events. Exterior cameras ensure better safety and security in outdoor communal areas Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter. Access and review recordings "A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust. With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
Evelina London Children's Hospital has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardized system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilizes a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. The DUOX 2 wire system functions perfectly using most types of cable Time and date stamping of visitors Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires system with aesthetically pleasing profiles and user-friendly features and functionality, the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
Round table discussion
It has been two years or so since the last ISC West trade show, the biggest security show in the U.S. market. The coronavirus pandemic has caused a year’s worth of trade show cancellations, and the trend will continue for a while longer. The absence of trade shows has been transformative for the security marketplace, among others, as companies implemented a variety of alternative approaches, with mixed results. We asked this week’s Expert Panel Roundtable: What impact has the cancellation of trade shows had on the security industry?
Security technology has been a vibrant and successful market for decades now, but sometimes the public is not aware of those successes. Awareness in some cases is limited because security technologies work ‘behind the scenes’ to keep everyone safe. In other cases, the industry may be seen in a negative light, based on misinformation about topics such as surveillance and privacy. How can we get the word out about our industry’s successes? We asked this week’s Expert Panel Roundtable: How can the security industry market and promote itself better?
Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.