Download PDF version Contact company
Ziggo Dome Amsterdam

The access control functionality
in the Ziggo Dome
is mainly used to
separate  the backstage area from the

public areas

‘Two years ago, I accepted the position of facility manager for Amsterdam Music Dome Exploitatie. At the time, work had just started on casting the concrete first floor for the Dome.’ says Ruud Bongers. This was the start of a hectic period for Bongers, which has involved specifying and purchasing all kinds of equipment and furniture varying from items as mundane as tables and chairs to the sophisticated access control and intrusion detection system. In his position as facility manager, Bongers is currently responsible for all building plant and systems, including the security systems such as the camera system and the access control and intrusion detection system.

Future-Proof


Bongers and a project manager of Black Box jointly analyzed which systems were available on the market, finally narrowing down the candidates for access control and intrusion detection to a shortlist of three. Because Ziggo Dome was looking for a system that could offer more than just access control and intrusion detection, Nedap’s AEOS system was finally selected as the winner. Bongers explains why: ‘We also wanted to be able to set up links to other building systems in the future, such as the heating system, the air conditioning system, the beer cooling system and, something that is very important here, the lockers for visitors. So we were actually looking for something that offered building management system functionality. The other suppliers on our shortlist were only able to offer access control and intrusion detection systems.’ The future-proof nature of the AEOS system swung the scales in its favor at the end of the day, because we were really choosing a platform and the system’s scalability and flexibility were decisive factors.

PIN Identification

In addition to future-proof functionality, the system also helps to satisfy a further key requirement, which was PIN identification in  order to gain access. This feature was required as a solution for specific challenges faced by the event venue. Madonna’s last performance here is a good example. When having 300 people at work here for that event, you can’t issue an access pass to each individual. So a PIN code is an ideal solution. AEOS is very easy to use and the codes can be created in just a few minutes. Bongers acknowledges that this is not really a high-security  solution, but rather a clear choice in favor of a compromise between convenience and safety. ‘Because the building is compartmentalized, this isn’t really a problem as somebody who has a code will eventually come across a door that doesn’t allow code entry. An identification unit with a card reader and keypad is fitted to all doors. For security reasons, a code will not unlock all doors as some are programmed to only react to an access pass. Furthermore, a combination of a code and a pass is also possible. This applies mainly for doors for which only permanent employees have access rights.

"Of all the doors in the building,
103 are equipped with access
control and a further 60 are
programmed to allow access
to people in possession of a
PIN code"

Three Sections

The access control functionality in the Ziggo Dome is mainly used to separate the backstage area, used by the performers and their crew, from the public areas. The offices are also a separate block with access control. Bongers: ‘AEOS is designed to ensure that the public stays in the areas it is allowed to use and to grant staff members access to the areas where they need to be. Of all the doors in the building, 103 are equipped with access control and a further 60 are programmed to allow access to people in possession of a PIN code.’

Certified Intrusion Detection

Furthermore, the system offers grade 3-certified intrusion detection performance. ‘That was a requirement for LiveNation’, says Bongers. ‘When a show is built up the day before an artist will be performing the next evening, a lot of value is in house. You wouldn’t want to have to cancel a show because for example Eric Clapton’s guitar was stolen during a break-in.’

Experiences

AEOS has been in operation for a few months now and Bongers’ findings are constructively critical. ‘AEOS is easy to use and effective. Particularly the access control functionality; we hardly have any problems in that area...’He has some criticism of the intrusion detection functionality. But, as his explanation reveals, that is partly attributable to the people who operate the system. ‘We have to make a point of walking a final fire inspection and closing-up round in order to check that all the doors are locked. If you don’t, you can’t switch on the system. But the problem is mainly caused by people who don’t take the time required to close up properly.’

Foolproof

Before we say goodbye, we can’t resist asking whether the system is completely foolproof - or have fans already been able to circumvent the system and sneak into their idol’s dressing room? Bongers laughs and tells us about the precautions taken by some of the leading performers. ‘When Madonna was here, we weren’t even allowed to access this floor. There was a bodyguard blocking the door, so any ideas you might have had about coming up here to get a cup of coffee were wishful thinking. The moral of the story is that the performer has a major say in how things are organized here. But in my experience, most performers are really pretty normal. For example, I shared a elevator with Paul Simon this summer.’

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.