Industrial & commercial security applications
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Ava helps the team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them. Spotlight brings relevant feeds to the operator...
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalizing or burglarizing the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the exis...
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no lon...
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a te...
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the...
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of...
Chung-Ang University, one of the universities in Korea, announced that they would test-run the "untact face recognition device combined with body temperature detection system" at the test of the regular evaluation of TOPCIT (Test Of Practice in IT) on the 20th. Trial at TOPCIT Test TOPCIT is a test that evaluates actual competency required by software (SW) industrial sites and is being used in various ways, such as granting additional points when selecting human resources from public institutions, financial institutions, and large companies. Measuring Body temperature is possible in conjunction with thermal imaging cameras The Da Vinci SW Education Center of Chung-Ang University plans to install the UBio-X Pro2, which measures body temperature, by recognizing the faces of students entering and leaving the test site to prevent COVID-19 infection and safety of applicants. Candidates apply for non-face-to-face visits in advance and certify their entry on the same day. Deep learning algorithms for large crowds The face recognition system uses deep learning algorithms to authenticate a large number of people in a short time as it can be certified through various angles and up to 2 meters away. Measuring body temperature is possible in conjunction with thermal imaging cameras and access can be restricted when abnormal body temperature is detected. "It is an opportunity to pre-emptively prepare for the post-corona era through the application of various untact systems," said Yoon Kyung-Hyun, director of the SW Educational department. "It is more meaningful since two students from the software department at Chung-Ang University are participating in the team in charge of the UNIONCOMMUNITY, which developed the face recognition system, through the industry-academic cooperation in the SW-centered university project."
Dahua Technology, with its award winning deep learning algorithms, proudly releases WizMind – a portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, thermal and software platforms, delivering precise, reliable and comprehensive AI solutions to verticals including government, retail, energy, finance and transportation. WizMind's human-oriented solutions Powered by AI and deep learning algorithms, WizMind provides comprehensive human-oriented solutions including facial recognition, privacy protection, human video metadata, people counting and stereo analysis, enabling rapid and precise reaction. In addition, it provides more precise and effective AI search to locate targets, generating various human data for business analysis. According to IHS, the total market value of professional video surveillance equipment will grow to $27.2 million by 2023 To protect portrait data, WizMind provides outstanding privacy protection. Based on deep learning algorithms, WizMind supports real-time mosaic masking of the human face or body detected in the monitoring area, which is needed in courtroom scenarios and may be valuable to retailers which can optimize their business through intelligent analysis of customer flow, recorded without violating privacy or GDPR. WizMind based on vehicles WizMind boasts multiple vehicle-based AI solutions, such as ANPR and vehicle metadata, illegal parking which provide more attributes of vehicles for easy control, quick search and business analysis. It is widely used in urban areas, residential community entrances, parking lots and toll stations. By extracting and comparing plate numbers with databases, ANPR helps managers of parking lots and city roads improve vehicle management efficiency with functions like Blacklist Alarm and VIP Recognition. ANPR also supports vehicle tracking, which helps police efficiently locate vehicles according to the crosschecking result. ANPR is able to recognize plate numbers in over 58 countries. WizMind with thermal technology WizMind combines deep learning algorithms with thermal imaging technology to help users achieve ultra-long-distance monitoring in harsh environments, non-contact temperature monitoring and early fire prevention. The Dahua WizMind series is compatible with mainstream third party technology partners With an accuracy of 0.3 degrees Celcius and a speed that monitors three people per second, Dahua’s High Accuracy Body Temperature Monitoring Solution has been widely and successfully applied within transportation hubs, financial institutions, commercial complexes, schools and other places all over the world, joining the global efforts in pandemic prevention and control. WizMind Ecosystem Initiating openness and collaboration, the Dahua WizMind series is compatible with mainstream third party technology partners, such as Milestone, AxxonSoft, ISS and others. Furthermore, WizMind Ecosystem provides the DHOP and sufficient API for our technology partners, enabling them to combine real AI joint solutions to our common customers, and a series of marketing activities will be engaged with our ecosystem partners. Dahua WizMind, a high-end AI series, aims to serve demanding scenarios in many vertical industries. With the mission of “enabling a safer society and smarter living”, Dahua Technology will continue to focus on “innovation, quality and service” to serve its partners and customers around the world.
Due to the escalating coronavirus pandemic (COVID-19), Messe Frankfurt New Era Business Media Ltd and ABEC Exhibitions and Conferences P Ltd, have decided that Secutech India will not take place in 2020. The decision is the result of travel restrictions and strict social distancing guidelines currently in place across India, and a lack of availability at the fair’s venue – the Bombay Exhibition Centre – during an appropriate time later this year. The fair will take place at the same location in Mumbai in May 2021. Stemming the spread of COVID-19 The Indian Government has taken extensive measures to stem the spread of COVID-19. Beginning from March 25, a 21-day nationwide lockdown was announced, effective until April 14. This has since been extended for another 19 days, effective until May 3. Strict social distancing regulations have been imposed, and all incoming and outgoing international and domestic flights have been suspended. With uncertainty and tight travel restrictions in place not only in India, but around the globe, pre-fair planning and preparations for Secutech India, originally scheduled from May 7 – 9, 2020, were severely hindered for the fair’s exhibitors and visitors. The decision to defer to 2021 Commenting on the cancellation, Ms Regina Tsai, General Manager of Messe Frankfurt New Era Business Media Ltd, said: “The evolving situation, including local and international travel restrictions as well as constantly changing public health guidelines made it impossible for the fair to be held as scheduled. Despite our best efforts, we have been unable to find a new available time slot at the fair’s venue to adequately serve the interests of our exhibitors in 2020. Because of this, we have taken the difficult decision to defer the fair until 2021.” Mr Manish Gandhi, COO, ABEC Exhibitions & Conferences P Ltd, further commented: “As members of an industry that prioritises safety and security, we are confident that the industry is in full support of our decision. We remain committed to supporting the business of our stakeholders wherever possible, and we look forward to welcoming the full fraternity for another productive few days of trade in 2021."
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organizers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organizers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user identification data is transmitted either to a host system such as a PC or to an endpoint such as a Human Machine Interface (HMI). A passive RFID transponder, soft credential such as a mobile phone app using BLE/NFC or smart cards and other contact-based credentials all can carry sensitive data or personal information. In the case of smart card or contact-based credentials, the storage of personal information such as name, address or date of birth is more prevalent compared to contactless credential where an identification number may be used. Security as a concept RFID media may directly lead to a compromise in your intended application’s security In general, security as a concept is always related to the entire system that includes RFID media (contact/contactless credentials), RFID reader, the host system and any database or cloud server. While accounting for security across a system is needed it is more important to consider the application or use case that is in question. One should carefully evaluate the consequences of any security breaches and if there is any sensitive information being exchanged from the RFID media to the host. As an example, the simple choice of RFID media may directly lead to a compromise in your intended application’s security. There are numerous references on security vulnerabilities related to Low Frequency (125KHz) contactless transponder types. The references focus on using interceptors to access unprotected static card information. The adversaries may then clone this credential that may be used for triggering action such as granting access to a facility or unlocking a computer. Some references also highlight vulnerabilities in the Wiegand interface about intercepting the data signals to capture card value. Therefore, some older RFID transponders and communication interfaces that may be based on the aforementioned technology or have been subject to vulnerability hacks are now considered fundamentally compromised. As mentioned previously, the overall security depends on every component of the system that includes the RFID reader. This article will mainly focus on some of the basic security considerations that need to be accounted for when choosing an RFID reader but also whether or not your application requires these abilities. Some of the key security considerations are as follows: Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms? In every application where RFID technologies are involved, there is a need to first assess whether encryption is required and if so, determine the exact channel where this needs to be enforced. It could be that the host interface requires the exchange of encrypted data or the air interface needs to transfer protected data. Once the requirements are established, one may then evaluate the strength of this security. Furthermore, many types of contactless transponders can store data within their memory segments and encrypt or lock these segments with cryptographic keys. An apt card reader is one that can not only decrypt the memory segments and access the data but also provides an easy means for the end-user to carry out this operation. In many instances, the end-users have their own customized cryptographic keys for their credentials and are unwilling to share these keys with the card reader provider. Therefore, having the capability to load custom keys by someone other than the card reader manufacturer becomes essential. This can be facilitated in multiple ways, such as implementing high-level APIs and allowing the user to write applications for the card reader, or it could be enabling the customer with agraphical user interface to enter keys used to access data sectors. Many types of contactless transponders can store data within their memory segments Do you require encrypted data exchange? If so, where and can the card reader support this? In a typical scenario, the card reader behaves as a medium to facilitate data collection and transfer between the contactless or contact-based transponder and the host system. The host system can either be an endpoint that locally validates the credential presented to it or it can be a microcontroller that sends data over the network to the cloud or a database for validation and authentication. As mentioned previously, assessing whether the need for encryption is between the RFID media and the reader or from the reader to the host is important. If the former, the appropriate credentials are required. Depending on this factor you may then consider choosing an appropriate RFID reader. There are use cases wherein personal information such as name, address, date of birth or biometric data can be stored within the credential, eg: smart cards or passports as credentials. Therefore, encrypting the exchange of such data both between the credential and the reader as well as the reader and the host becomes critical. Moreover, encryption algorithm engines such as AES, DES, 3DES, or the capability to implement custom algorithms, need to be present on the card reader as this enables ease of integration. In cases where smartcards or contact-based credentials are used, the host system typically drives the communication in its entirety. So, the card reader must also have: Software capabilities such as Personal Computer Smart Card (PCSC) or Chip Card Interface Device (CCID) mode of communication. The availability of drivers to facilitate communication with the host also enables easy software integration. Hardware support for communication standards such as ISO7816 and the presence of Secure Access Modules(SAM) slots and other contact-based interfaces. Does your application require MUTUAL authentication with Secure Access Modules (SAM) and RFID media? If so, does the reader support This? A Secure Access Module is a type of smart card that follows a contact-based communication standard to interact with a card reader. These modules ensure the protection of security keys as well as facilitate cryptographic operations. Typically, SAMs are used to generate application keys based on a specific master key or to generate session keys. They also enable secure messaging between the RFID media, the reader and the host system. Many contactless credentials hold memory segments/applications that are encrypted with cryptographic keys. These keys are often stored in SAMs and supplied to card reader manufacturers. This not only ensures the security of the keys but adds a step in the authentication process. The card reader in this case should first perform authentication operations with the SAM and then carry out a series of cryptographic and bit manipulation operations between the contactless card and the SAM. This can be further secured by adding a key diversification step. The card reader must be able to support such a scenario both in the hardware as well as in the software. Many end-users require the card reader to natively support such a scenario and have the ability to provide high-level API’s to help in their implementation. In addition to this, high-security applications demand the transfer of data in an encrypted format. One can ensure end-to-end encryption/security with the help of SAMs. In such an architecture, the reader facilitates mutual authentication with the RFID media and the SAM, thus transferring protected data over a Radio-Link and also ensuring the security of encryption keys. The reader can also transfer data encrypted by the SAM to the host system maintaining a high level of security across the system. Appropriate precautions are to be put in place to improve the overall security Note that the safety of distributing SAMs as well as administering the installation process within the reader should be treated as a separate issue and tackled accordingly. There is also an issue of the readers being stolen or the SAM modules being dismounted from the reader. The security considerations here do not indulge in these topics and appropriate precautions are to be put in place to improve the overall security of the system. Does the card reader have communication interfaces other than Wiegand such as RS485 or RS232? The Wiegand card as well as the Wiegand interface for data transmission is a 40-year old technology that originates from the Wiegand effect discovered by John R. Wiegand in the early 1970s. While the Wiegand cards are still in production, they have been largely replaced by newer and cheaper forms of access cards. However, these cards are still based on the Wiegand data format that is susceptible to interception as the data are available in plain text. Also, the Wiegand interface introduced in the 1980s remains prevalent across the logical access as well as the physical access control industry despite various security vulnerabilities. This technology no longer conforms to the current security standards. It is therefore important for integrators to choose a communication interface that can offer higher security from interception and support encrypted data exchange. Do you require tamper detection technologies? If so, can the reader meet this requirement? The need for tamper detection largely varies from one application to another so it is more important to consider whether this level of security is suitable for your respective use case. As an example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical since tampering with the reader can ultimately lead to the downtime of the printers but will not compromise the safety of your documents. Typically, in such scenarios, the card reader works hand in hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the solution simply prevents the release of any information. On the other hand, high-security environments such as data centers certainly need greater protection. One must thoroughly evaluate the consequences of any attempts directed towards compromising the device integrity or the data associated with the device. These topics need to be considered separately and are outside the scope of this article. In conclusion, depending on the application, the credentials involved as well as the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly on the card reader for superior protection against threats. Do you require the reader's ronfiguration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement? We are all aware of system and application software updates as at some point our phones have received security patches or app upgrades over the network. In the case of card readers, the process is quite similar except here the software or configuration updates might require encryption based on your use case. For example, if an end customer is reading static card numbers from an RFID media or isn’t using data protected by encryption keys this does not require the firmware or the configuration to be encryption for a simple reason that these files do not carry any sensitive information. The need to encrypt configuration/firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential, or should a customer wish to move to a higher security credential encrypted with keys. This means that either their existing card readers or new card readers must have a configuration that holds these keys. Configuration or firmware must also be encrypted since it holds sensitive information In such a scenario, the configuration or firmware must also be encrypted since it holds sensitive information. If the configuration or the firmware is encrypted, the file will no longer pose a security risk and can be shared with customers to perform updates to the existing readers or with the card reader manufacturers to load new readers with the configuration of firmware updates. This not only secures the sharing process but also the update process since the reader is now receiving an already encrypted file. After all, it is essential to choose a card reader that can carry out the aforementioned security considerations but more importantly the security features that are chosen need to be appropriate to the requirement of the customer. Any integrator first and foremost should thoroughly evaluate the respective application. They should work with subject matter experts in the field and establish requirements and objectives. After developing the concept, system architecture, data flow as well as various secure channels, only then can one begin to account for the security features needed. This process not only helps cement the end system’s overall security view but also elucidates the exact security requirements that correspond to the resulting application. In conclusion, choosing an RFID product that not only has the above security features but also has a flexible system design capable of accommodating future adaptions will prove to be the right choice for OEM’s and system integrators.
Electric locking is among the most ubiquitous examples of everyday security. Yet the complexity of electric locks and the advanced technologies deployed to provide simple, dependable and, for the most part, impenetrable locking often goes unnoticed. And that’s a good thing: when we take things for granted, it usually proves they’re fit for purpose. As experts in the field of solenoid actuated designs, we’re okay knowing that remote electric locking solutions are taken for granted and that the design sophistication behind a functional and reliable locking assembly is often overlooked. As readers of this journal will know, security takes many forms. Perhaps the most recognizable application of a security policy is the ability to lock something. A door to prevent access. A gate to control the flow of people or vehicles. Or shutters to guard against theft. Or to unlock a turnstile to allow ingress and egress, as found in leisure centers and museums. Or to switch between either flow direction when required – think soccer match stand access, for instance. In part one of this feature, we look at straightforward electric locking solutions that use solenoid actuators. Straightforward security measures However, while locking can be one of the simplest security initiatives, it’s also capable of being among the most complex where sophisticated measures are called for. In part two, we will cover specialized electric locking technologies and some more unusual security solutions and application examples. Among straightforward security measures is remote locking Among straightforward security measures is remote locking – a function found almost everywhere you look. Unless you’re the proud owner of a classic car, when did you last physically put your vehicle key in the door lock? Remote locking ups the ante for designers who need to incorporate security in an assembly, an application, a product or a system. Solenoid Workhorses Solenoid actuators and electromagnet technologies are the bedrock of electric locks. Remote operation – activating a lock from a distance – is commonplace. Wireless RF transmitters in the key fobs of modern vehicles activate the central locking system. Cards with embedded RFID chips, fingerprint readers and facial recognition systems provide selective access to buildings, typically by either actuating a solenoid lock or releasing a powerful door magnet. You can see examples on the Jubilee and the new Elizabeth (Crossrail) lines on the London Underground. They use electric solenoid-based locks to secure platform access screen doors, only allowing them to open once the underground train has arrived. Solenoid-based electric locking is at the heart of safety-based security in applications such as elevator doors and disabled access lifts, on building hoists, and as interlocking systems for screens and safety covers on machine tools, to name a few. Solenoid-based electric locking is at the heart of safety-based security These are straightforward applications that address a range of issues that come under the general heading of security. Others demand special features built into the electric locking mechanism to meet specific end user requirements. This added complexity can present a design challenge to the inexperienced. Electro-mechanical design engineers invariably have a useful broad knowledge for developing products but not necessarily a core expertise in solenoid technology. One example we like to use is a railway carriage. To design and build that takes a huge breadth of knowledge and expertise due to the many systems and assemblies a carriage comprises. But passenger trains now feature remote electric door locking which must function perfectly – and without which the rolling stock is unfit for purpose. That electric locking subassembly design is a critical feature and a specialist development project. Solenoid actuators and electromagnet technologies are the bedrock of electric locks Shotbolts A generic term used for electric solenoid locks is shotbolts. In these linear actuating units, the solenoid typically moves the bolt directly or through a bell crank to turn the actuation through 90 degrees, or to extend the linear movement of the bolt. They can be built as Fail-safe or Fail-secure models, meaning energise-to-lock, or energise-to-release respectively, which determines the state they adopt in the absence of power. You would want some applications to default to unlock in the event of power loss, and others to default to the locked state. Both types usually deploy a spring to return the bolt in the quiescent unenergised state. Bi-stable is another functionality available. In this design, no power is consumed in either position. A loss of power will leave the device in its last state. Scaling down Some shotbolts are large. Those designed to secure the access ramp on the Solent hovercraft built by Griffon Hoverwork are powerful units – and in that application a weatherproof design is deployed to withstand the saltwater spray and frequent washdowns. But a shotbolt and the solenoid contained within it can be physically quite small and require minimal power, yet still provide highly secure locking in a mortice lock arrangement. This is where the locking assembly starts to become complex Over the years, bespoke designs have been developed for diplomatic bags and Cash In Transit (CIT) cases. Both use small, low power actuators. In the latter application by specialist Cash In Transit equipment manufacturers HDH, intelligent electric lock technology provides unique features – and there’s a range of surprises in store for anyone accessing cash boxes illicitly. Technologies in cash transit solutions include GPS tracking, alarms, remote monitoring and automatic ‘cash degradation’ systems if a case is forced open. Ensuring that degradation systems don’t activate when a case is opened legitimately is equally important. This is where the locking assembly starts to become complex, requiring special design expertise. The CIT solenoid lock uses a 90°actuator to latch, lock and arm automatically if required but can be set to not lock or arm as the actuator travel doesn’t engage with the mechanical latch mechanism by default. Integrated technology solutions inside the case include daylight sensors, surface protection wires inside and out, and reed switches between the lid and the base. All contribute to safety precautions that prevent accidental activation and protect the valuable cargo and the operator. But for first line security, straightforward shotbolt electric locking is still at the heart of CIT cases. Internet of Things Miniature shotbolts are also used in some medical ventilators – a topical subject at the time of writing during the global coronavirus pandemic. They are also increasingly appearing in consumer-level Internet of Things (IoT) applications, being a key component in home automation applications. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available. We dealt with some straightforward technologies and applications here. In part two, we will look at special technologies built into more sophisticated solenoid locks to prevent forced entry, at materials that guard against explosion risks in hazardous environments and even at the use of proportional solenoid technology to manage pressurized gases.
People have always had an innate need to feel secure, from building fires at the front of caves that ward off predators in prehistoric times, to today’s efforts of locking your front door. This need for security extends to venturing further afield from the home and is critical for communities to thrive and survive. More than ever, people want to be and feel safe; protected against physical and now biological threats. When it comes to staying safe, populations around the world have recently demonstrated immense adaptability to changing the way we live our lives in order to protect ourselves and others. In the wake of the COVID-19 pandemic, it isn’t strange to walk down a high street and not see swathes of people wearing face masks, where as little as six months ago it may have been an unnerving sight. While wearing a mask may not be a choice made by the majority in ordinary times, people are compliant as it is helping them get back to a “new” normality in day-to-day interactions. The same can be said for the use of technology. Beyond pure security, the technologies used to keep the public safe can become integrated into existing environments to make it easier to stay safe while visiting areas where there could be safety risks. Technologies used to keep the public safe can become integrated into existing environments Technology enabling freedom A good example of this is airports. The aftermath of the 9/11 attacks in 2001 changed how we are checked in at airports before boarding a flight, and I’m sure countless lives have been saved as a result of this more stringent security measures. However, the development of new technologies, which have been created against the backdrop of a more threat conscious world, could mean we are able to relax the experience of going through airport security for travellers. We now have innovations to spot, amongst hordes of people, those who pose a threat, while blending in with the general public. If we are able to make these identifications before an act is committed, we can cut out some of the draconian measures we are all so used to with scanning passengers before travel at a security checkpoint. If this is the case, then we could get to a model whereby you can pass through transport hubs, like airports, more freely, as fewer visible, large, overt checkpoints will be needed. And best of all, these new technologies can protect personal identity and civil liberties, until a threat object or behavior is detected. Concealable security solutions Today, visible checkpoints scan people in masses, using such large, wieldy devices, such as metal detectors, millimetre machines and hundreds of surveillance cameras peeking down from the ceilings. The use of these systems, which can feel intrusive and hold people up as they wait to pass through, can be reduced by employing new, innovative and concealable security solutions that are able to detect threats, but blend in with the existing environment; basically unseen, but always watching. For example, new advancements in magnetic technologies can be concealed in everyday objects that are aesthetically pleasing, such as planter boxes, which people walk past these every day without really noticing. These threat detection sensors, concealed in planter boxes, can scan individuals and their bags for catalogued metal objects. They can distinguish between those that may pose a threat, e.g. gun, knife, rifle, and those that are unlikely to, e.g. phone, keys. With this advanced magnetic technology, it becomes possible to discover weapons on a person's body, allowing for immediate alert notification to onsite security. Beyond physical objects, there are also small, concealable sensors that can detect, diagnose and track airborne trace explosives, chemical warfare agents and volatile organics. These sensors use tuneable electronic signals to detect chemical threats with a parts-per-billion sensitivity and can then send an immediate threat alert to security to investigate further. Threat detection sensors Innovative threat detection sensors can be integrated with existing security solutions These new, innovative threat detection sensors can be integrated with existing security solutions, such as access control systems, as well as security policies and procedures to enhance the effectiveness and performance of onsite security personnel and first responders. A great example of integration is using AI-driven/computer vision object recognition software with existing CCTV systems to detect visible threats, such as guns or knives. Every second in an early warning notification of a visible weapon drawn can save lives and possibly stop an attack from being carried out. Security and law enforcement can be alerted in real-time of the location and nature of the incident, so that action can be taken immediately. Extending the security perimeter with new detection sensors means security personnel and law enforcement don’t have to rely on someone reaching a checkpoint before a physical or chemical-based weapon is detected. And as these solutions get deployed more and more, awareness of these technologies seep into the marketplace. Would be assailants will be more likely to be deterred, as they think about walking along a path to the building or checkpoint and getting caught before they can instigate an attack. And to my earlier point, it also affords law abiding citizens more freedom to move around public spaces as they do not need to go through the lengthy security checks that we currently experience. Addressing current threats to act fast Unfortunately, annually we are seeing a rise in gun crime and knife attacks in soft target areas, with daily incidents reported across the US and UK. This has been exacerbated, specifically in the US, by the coronavirus pandemic and civil unrest, where gun sales have escalated in recent months - the FBI conducted 3.7m background checks on those wishing to purchase firearms in March 2020, an increase of 1.1m over March 2019. With so many more guns on the street, it increases the opportunity for bad actors to use these weapons with ill intent within their communities. It is important to harden soft target areas where our communities gather, such as schools, churches, resorts, office buildings, and stadiums and arenas. However, the nature of these venues - somewhere to meet, have fun and relax - do not lend themselves to prison-style, fortress-feel security measures. As well as the big, overt and visible technologies mentioned before, can in fact prove targets for terror. However, the good news is that some public sites have started to invest in and install these new innovative weapon detection solutions. This contributes to the creation of a seamless experience for civilians, who are able to enter and enjoy these locations without forsaking the way of life they have come to know and love, without divesting item in their pockets, pat downs, and slow walkthrough security scanners. Making public areas safer Beyond single-site installations at these locations, city managers and city councils are now looking at the widespread deployment of these new, concealable, touchless and unobtrusive security technologies, all with a goal to make their public areas safer. Once a threat is detected in one venue, an alert can be sent out in the immediate area Furthermore, by having an interconnected security system, once a threat is detected in one venue, an alert can be sent out in the immediate area. This will be picked up by other local security personnel in nearby sites, so they can be on guard to protect members of the public around their premises, as well as support law enforcement in finding and neutralising the threat. We’ve all heard the phrase smart cities, but with innovations in physical and biological threat detection, these cities can be as safe as they are smart.
Ethics are an important – but some might argue, undervalued – aspect of the security marketplace. To kindle the industry’s interest in ethics, the Security Industry Association (SIA) in early 2019 created a working group on Ethics in Security Technology. The working group developed a list of ethical principles, which were approved by the organization’s Executive Committee and Board of Directors and became the SIA Membership Code of Ethics. SIA member companies must adhere to the Code of Ethics, and there are consequences of noncompliance, up to and including possible expulsion from the organization. In addition to adopting the Code of Ethics, the Board of Directors have revised the organization’s bylaws to require that members read, understand and adhere to the Code of Ethics as a condition of SIA membership. Navigating issues “SIA wanted to be proactive on this and give members resources to navigate day-to-day issues,” said Ron Hawkins, SIA Director of Industry Relations. He notes that the Code is intentionally written broadly to be applied to a range in cases, and to provide SIA leaders with latitude making decisions. Current members will be required to adhere to the code when they renew their membership Current members will be required to adhere to the code when they renew their membership, which will be sometime during 2020 or in the first half of 2021, depending on when a member joined (for a one-year term). If there is an ethics-related complaint or an issue with a member company, the matter is considered by SIA leadership, which will review the concerns and ask the member company to respond. The resulting judgment might be a written notice/warning, a suspension of membership or expulsion. Enforcement of the Code of Ethics might be triggered by media coverage, government announcements, or written complaints submitted to the SIA Executive Committee. Handling complaints Hawkins emphasises that each complaint will be handled by the Executive Committee and full Board of Directors on a case-by-case basis to address anything not specified in the principles, which focus on requirements rather than consequences. Hawkins says it would be unlikely that any public announcement would be made about enforcement of the Code unless or until a member company were expelled. Since the Code of Ethics took effect on July 1, 2020, SIA has not taken any action on any member company. Any issue with any current member would be addressed on their membership renewal date, Hawkins said. The code applies to all SIA member companies, both manufacturer companies (which make up more than half of the membership) as well as to integrators, service providers, distributors and other member companies. Act with honesty, integrity and transparency Among the principles in the Code of Ethics are requirements to act with honesty, integrity and transparency, and to avoid fraudulent or misleading business practices. Marketing materials must be accurate. Sustainability and environmental impacts of products and services must be considered. The Code also opposes prejudice, harassment and abuse in the workplace The Code also opposes prejudice, harassment and abuse in the workplace. SIA companies should work with law enforcement to enhance public safety while respecting expectations of privacy. Cybersecurity risks should be monitored and mitigated “as much as reasonably possible, according to industry best practices.” Products, services and solutions should not be designed or manufactured in a manner as to “surreptitiously transmit information to third parties.” Finally, the principles require SIA member companies not to “knowingly” design, manufacture, sell or deploy products that have been deemed by any government authority or self-regulatory entity to “support the infliction of human rights abuses, the restrictions of civil liberties, and/or the implementation of other oppressive measures.” Hawkins says that the interpretation of “knowingly” would be made by SIA leaders. Why does the industry need The Code of Ethics? He would not comment on whether the Code of Ethics applies to activities by global companies that do not involve that company’s U.S. subsidiary (which is a SIA member). Such details would be decided on a case-by-case basis by the SIA Board of Directors, he said. The Code of Ethics is needed in part because the security industry impacts important issues for society at large, from privacy to civil liberties to national security. The Code of Ethics is needed in part because the security industry impacts important issues for society “Everywhere you go, you encounter security technologies, such as video cameras in public places,” says Hawkins. “Even if someone is not a purchaser or user of security technology, they will encounter it every day. So security is in a unique position because of its reach beyond the people who buy and use it, and it requires consideration of issues such as civil liberties and privacy.” Hawkins notes that the SIA Board of Directors already has its own “Code of Ethics” which directs how board members perform their duties, such as abstaining from a decision that might involve a competitor.
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analog video surveillance systems in use at their existing locations and plan for new stores. Analog video surveillance cameras Management wanted a camera that provided a clear picture, while minimizing bandwidth usage Saraya Charlton, Kirkland’s Loss Prevention Investigator, said the analog video surveillance cameras they had in place were acceptable, but they desired cameras with wider coverage and better resolution. The department was also frustrated with the amount of time it took to investigate incidents for loss prevention and personal injury claims. Each time they were called to investigate an incident – vandalism, theft, employee misconduct, a slip and fall, or a cut from broken merchandise – each individual store had to extract the footage from the analog DVR at that location and send it to loss prevention at Kirkland’s headquarters. Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely, that would make the loss prevention investigation process more efficient and would provide additional benefits. Management wanted a camera that provided a clear picture, while minimizing bandwidth usage and had analytics capability. IP video surveillance solution Working with several systems integrators, Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise Video Management Software (VMS). The first phase of the security upgrade has included the deployment of 1,800 Hanwha Wisenet X series XNV-6011 2 megapixel HD dome cameras and Wisenet Lite vandal-resistant dome cameras at 200 Kirkland’s locations, as well as the distribution center and the e-commerce building. As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution. They expect to have a full migration to IP at all locations by 2021. Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise VMS Perfect fit for The retail environment The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less Each Kirkland’s location is outfitted with approximately eight cameras that are positioned to capture the entrance, the sales floor and the back of house operations. Charlton said Hanwha’s cameras provide the most comprehensive view of the store possible. “The wide-angle capability – as well as the quality of the camera – is really what sold us on Hanwha,” said Charlton. “We are getting the best views possible and they are allowing us to see the entire sales floor which is exactly what we wanted and needed.” Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment. The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less. Pulling recorded video Charlton said the Hanwha cameras are particularly useful at store entrances because, thanks to the WDR feature, video images are not affected by the bright sunlight that often shines through the windows and they can still see faces clearly. And because many of Hanwha’s cameras offer license free analytics, Kirkland’s will begin exploring that capability in the future to gain information on people counting, heat mapping and dwell time. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency since the team is able to pull recorded video from any camera via the Salient VMS rather than wait for information to be extracted from an analog DVR. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot and resolve any camera issues remotely first rather than unnecessarily sending out a service technician. Video surveillance and security bandwidth In addition to offering quality images, improved field of view and more efficient operations, the Hanwha solution has also helped Kirkland’s conserve valuable bandwidth with Hanwha WiseStream II compression technology, said Charlton. WiseStream II dynamically controls encoding, balancing quality and compression according to movement of the image. Combined with H.265 compression, bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. “We share our video surveillance and security bandwidth with our Point of Sale system and we don’t ever want to take away from the bandwidth of POS transactions or impact the speed at which they go through,” said Charlton. “Hanwha’s Wisestream compression technology fits our business model and along with Salient helps preserve and efficiently manage bandwidth. It’s really helpful to have a camera that’s smart enough to be able to tweak and regulate itself.”
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
The experience of high-quality, high-performance automotive engineering and the sleek lines and signature beauty of luxury auto brands like Porsche, BMW, Mercedes, and more are investments worth protecting. When damage to these vehicles occurs and body work is required, only the work of attentive, highly trained, and craftsman technicians owners can trust, will do. Phoenix-area Autobahn Collision serves the region’s owners of luxury European automobiles with precisely such expertise they can trust, and when the time came to upgrade the premier body shop’s security infrastructure, they looked for a surveillance solution able to meet the same high standards of performance they meet every day. Seamless Integration Autobahn Collision provides customers with a service and repair experience, well-crafted to be as high-end, responsive, and trustworthy as the luxury vehicles they work on. The body shop’s expectations were no less for their surveillance solution, which needed to seamlessly integrate new and existing technologies in a way that was both easy to use and maintain, allowing for monitoring and documentation, as needed, without distracting from the team members core priority: optimising customer experiences and quality body work for their customers.Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution DirectIP NVR Surveillance Solution Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution with IDIS DirectIP network video recorders (NVRs) at the heart, addressing all issues of compatibility and operational concerns. IDIS NVRs, specifically designed to reduce (if not eliminate) compatibility issues, support multiple industry standards and 3rd party protocols. At Autobahn Collision, SARC integrated multiple IDIS DR-8364(F) NVRs in designing a user-friendly surveillance solution that enhanced and fully supporting the shop’s existing IP camera infrastructure. IDIS DR-8364(F) series of NVRs The IDIS DR-8364(F) series of NVRs have multiple features that enhance the overall ease-of-use and maintainability. The DR-8364(F) supports 64 IP channels of 4K UHD with a maximum incoming throughput of 900Mbps, which means fewer NVRs are needed to support a large installation of cameras. Fewer devices reduce the overall complexity of any solution, by definition, and mean less time spent on installation and maintenance. The intuitive DR-8364(F) NVR interface, common to all IDIS products, also means that training and transition investment is minimized. IDIS’s license free software model, which also includes free software updates, further minimizes the cost and complexity of owning and maintaining an IDIS solution. Enhanced protection for luxury vehicles The upgraded solution allows Autobahn Collision and a team of remote monitors to keep the premises—and the concentration of luxury vehicles, parts, and accessories—secure 24 hours a day / 7 days a week, enabled by the enhanced recording, storage, and failover benefits of the IDIS DirectIP NVRs and IDIS’s modular IDIS Solution Suite VMS. Data can be transferred on existing cabling and saved in existing storage space The IDIS DirectIP DR-8364 NVR’s support for H.265 with IDIS Intelligent Codec and Motion Adaptive Transmission (MAT) reduces the need for additional bandwidth and storage upgrades, providing up to a 90% reduction in both bandwidth and storage utilization. IDIS SmartFailover Additional data can be transferred on existing cabling and saved in existing storage space. Multi-layered data protection through IDIS SmartFailover features include RAID 5 storage redundancy, dual power supply redundancy, and NVR failover, which provides support for a standby NVR that continually monitors the primary NVR (taking over recording if the primary hardware fails). IDIS SmartFailover ensures that data integrity and system operation are automatically monitored and maintained, simplifying system support and maintenance tasks. Real-time monitoring, playback and review, high-quality imagery for reference and documentation purposes, and more are now seamlessly empowered by the new system, allowing Autobahn to continue doing what it does best of all, meeting and exceeding the needs of the region’s most discerning vehicle owners.
Ciudad Ros Casares has become one of the most important business parks in Valencia, Spain. It is a unique commercial and residential construction, which responds to the new business and networking requirements. The intercommunication system chosen by the project managers is the MEET IP System from FERMAX, because of its high performance and integration features as well as the security offered by MEET. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader Residential management software The project has a total of 245 apartments in 2 buildings, with two outdoor panels per building plus a concierge service managed with MEET's residential management software. The chosen outdoor entry panel is the MILO Digital Touch Panel and the 245 apartments are equipped with the MIO 7'' Monitor. The project is equipped with high technological features and qualities of different types, large leisure and green areas, general and specialized services and an excellent geo-strategic location. This commercial condominium includes offices, stores, a business center, spaces built to organizing events and apartments for rent. The installation of Fermax MEET system started in January 2019. Learn more about MEET by Fermax in this video:
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Round table discussion
Traditionally, security industry professionals have often come from backgrounds in law enforcement or the military. However, the industry is changing, and today’s security professionals can benefit from a variety of backgrounds and educational disciplines. The industry’s emphasis on technology solutions suggests a need for more students of computer science, engineering and other technology fields. The closer integration of security with related disciplines within the enterprise suggests a need to prepare through a broad array of educational pursuits. We asked this week’s Expert Panel Roundtable: What is the role of higher education to create the next generation of physical security leaders?
For several decades, Baby Boomers represented the largest sector of employees in the physical security market. However, these security professionals born between 1946 and 1964 are now nearing retirement – or have already retired. How will the security market change as the next generations step up to make their contributions? We asked this week’s Expert Panel Roundtable: As Baby Boomers approach retirement age, what are the positives and negatives in the physical security market?
The COVID-19 global pandemic continues, and more and more companies are looking for ways to continue (or resume) operations while minimizing the coronavirus’s negative impact on their workforce, or potentially contributing to disease spread among the wider population. Thermal cameras have been proposed as a solution to screen individuals for elevated body temperature since the beginning of the pandemic. However, the technology has its detractors, and there are regulatory questions. We asked this week’s Expert Panel Roundtable: How can thermal cameras be used effectively for fever detection to screen for infectious diseases?