Key management, integration solutions, access control software
Round table contributions
How do you stand out in a world of commoditization? We live in a world of commoditized consumer goods. You probably own at least one item which would be considered "commoditized" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone even a regular cell phone? Now they're not only virtually ubiquitous but most cell phones owned by people are smart phones. Commoditization is so prevalent in our everyday lives that consumers become inundated with options and manufacturers continuously endeavor to innovate and distinguish themselves from their competitors. We asked our panellists to give us their thoughts on what impact commoditization has on the security market and how people can differentiate themselves in a commoditized market.
Just like many things, security systems have their own life cycles. Most end users would say that a "good" system should last a certain amount of time. Each system or device has a generally established and expected life span, and anything that falls short of its life expectancy is generally deemed as "poor quality." We asked some of our panellists to reflect on the life cycles of security systems. We wanted to get their insights on trends they have observed in the frequency of system replacements as well as what variables impact the life cycle of physical security systems.
The general public often has misconceptions about security systems. How should security industry experts educate the general public to better understand security systems and their capabilities? As security industry professionals, our panellists are more than used to explaining security systems to customers and other members of the general public. As experts in the field, it is their prerogative to help set the records straight when it comes to what people understand about security systems. Sometimes people expect security systems to be able to do more than they actually can, or think that they infringe on our privacy when they don't in reality. Having a better and clearer understanding of security systems is important not only on an organizational level from an end-user's perspective, but also for the general public - everyone has the right to know what measures are in place to ensure their safety and that these particular measures are not infringing on their privacy. We asked our panellists how security systems are misunderstood by the public in their experience, what unrealistic expectations they find that people have, and what they think security industry professionals can do to educate the public.
Information overload. That's how tradeshows can seem. You're being fed lots of information by several different people in a short amount of time. It can all be very overwhelming. So what do you do? It's relatively easy to create a plan for smaller shows. But with larger events such as Security Essen, IFSEC and ASIS, it's far easier to become overwhelmed by the amount of choices and options.With Essen and ASIS just behind us, we asked some of our panellists to reflect on these and previous tradeshows and share their tips and advice on how to get the most out of such large-scale events.
You can expect to pass through tight security checks in environments, such as airports and government buildings, which are greater targets for terrorist attacks or other forms of violence. You don't expect to pass through the same level of security checks in neighborhood shops and schools. It's a simple rule that there will be more security systems in places where there's a greater need for them. Generally speaking, there isn't such a high need for very high end security systems in schools...or so most people seem to think. However, when you consider all the recent school-related crimes we've seen in our country in the last 15 years, you're almost forced to think: has the need for better security systems in educational institutions been underestimated? We've asked some of our panellists to comment on how technology could have made a difference in some of the recent school crimes our nation has seen.
Articles by Brenda Koesterman
Intelligent asset management is a natural extension of access control Key and asset management can integrate with other security disciplines to extend beyond the much-hyped vogue for 'convergence' and move towards truly intelligent building management. Brenda Taylor, Sales and Marketing Director of Traka, shows how assets can be protected with an approach that draws on shared data while making its own contribution to enterprise-wide information. A point for anybody who has begun to look beyond traditional metal keys is that keys are of no value in themselves; their worth lies in what they give access to and the protection they afford to processes and assets, be these equipment, vehicles, tools or even weapons by selectively restricting who has them and how people move around a site in order to use them. Access control in terms of door management progressed beyond the traditional key as soon as role-based discrimination between staff was made possible by the magstripe card and subsequently by proximity cards using RFID. Developments in the form of protocols such as Weigand followed. High-level access control measures may now combine evaluation of a card submitted by the user with biometric scanning of their retina, iris, finger or the whole topography of their hand. Delayed adoption of this technology in order to control the issue of keys and discriminate between staff members on a need-to-have basis has made key management a poor relation of access control. But some companies have pioneered fob systems in which use of keys is controlled and recorded with the fob – usually a nickel-plated cylinder – being attached to the keys via a tamper-proof metal seal. A uniquely-identifiable chip within the fob allows facility supervisors to impose hierarchical rights management on use of the key with the same kind of sophistication that we associate with door control. Management software now allows the pooling of data between different sectors of the security spectrum, a collaboration which makes both the economic and logistical cases for intelligent key management overwhelming. Key Management: Fobs Serving as Keys Access control in terms of door management progressed beyond the traditional key Few companies working with elite retailers have made the fob the key itself rather than just an attachment and using the fobs to control access to forklift trucks. Only a staff member with a fob confirming that they have an appropriate license and training certificate (which must be in date) can even turn on the ignition. In this way, a security mechanism permeates through health and safety by assessing a user profile before granting privileges. Similarly wide-reaching systems are in place at mines in South Africa. Stringent safety practices log a worker’s hours in areas where they may be exposed to contaminants, and when fob details indicate that a threshold has been reached the worker is unable to use vehicles and equipment or in some cases even get onto the site. Leading intelligent key management systems are well placed to share data with other security disciplines, the most obvious interaction being with access control. The drive for this integration stems from good engineering and business practice but interconnectivity is also being promoted by the standards bodies ONVIF and PSIA. Open Architecture and Intelligent Asset Management Common standards are also being promoted by major access control developers to show that intelligent asset management is a natural extension of access control, and information should ideally be shared seamlessly across databases. For example, two systems can interact to ensure that a warder can only open a door to a prison wing where he/she might be vulnerable to assault once they have taken a personal attack alarm from an RFID locker. Similarly, in the petro-chemical sector, a worker might only be allowed to enter an area where there is risk of accidental contact with a toxic substance once they have taken charge of a respirator. Open protocols are allowing exchange of many types of data, and the positive spin-offs between asset management and security/safety systems are obvious. Exchange of information may soon extend to fire or emergency mustering since a staff member identifying themselves to an intelligent key cabinet in order to access an asset such as a tool is often a more recent indication of their location than the opening of a door. This kind of functionality is at concept stage only but it underlines how building management systems will only be truly ‘intelligent’ once they swap data across the widest possible range of sources. Integration of Access Control With Video Surveillance and Visitor Management Software Interoperability between security sectors is a ‘given’ now and not a debate. Discerning clients see it as a starting point. Notably, access control is expected to report to CCTV with a standard example being the manner in which break-glass incidents either trigger CCTV recording or send a request for recording to be at a higher resolution. Consultants specifying new-build installations now demand that access control, key systems and issue of assets should all integrate with CCTV, visitor management software and enterprise-wide online incident reporting such as PPM2000. Intelligent building management systems (BMS) have also entered the mix, and integration with BMS can help security meet a green agenda. Truly integrated solutions are bringing together access control, fire detection, biometric screening, photo ID and PA/VA under intelligent platforms with key and asset management As security systems converge, approved contractors visiting a site on a regular basis can be granted some of the access rights of staff members and may be issued with site tools and equipment. At a more general level, it should be noted that good system architecture will now draw on the intelligence of field devices at the ‘edge’. Leading asset management solutions feature intelligence at a product or hardware standpoint. Disputes between staff as to asset usage (perhaps the claim that one staff member has used a colleague’s fob and, say, crashed a vehicle) can be resolved easily when key cabinets are integrated to CCTV with analytics. Security alarms can be scaled. A low-key alert such as a beacon might advise a staff member of an innocent mistake such as putting a key into a wrong position while an audible alarm would be activated by more unusual behaviour around a cabinet such as somebody opening and closing a door repeatedly with no associated key event. It should be noted that while the transaction logs generated by key tracking software are normally used by security managers to evaluate atypical threatening incidents, commercial managers can also use the data to assess trends in staff movement and behaviour. Conclusion The PSIA has issued a press release agreeing with a claim by IMS (the security industry’s leading market researchers) that “open standards for access control could bring a dramatic change for vendors and alter the face of the access control industry as it is known today”. The PSIA differs with IMS only in saying that the industry is even further along the road to embracing open access control standards than IMS appreciates. If building subsystems such as access control and asset management are to improve they must continue to integrate and make good judgment calls based on any situation that might arise. On the BMS front, current trends are more encouraging. Truly integrated solutions are bringing together access control, fire detection, biometric screening, photo ID and PA/VA under intelligent platforms with key and asset management proving versatile components in security and situational awareness.
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload