Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offi...
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actual...
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before the...
Videosoft is going global with its range of adaptive low bandwidth video streaming products. The Videosoft suite of cutting-edge video streaming products, including the brand new FireBird F-100, delivers high quality, low latency live video over unreliable or congested networks, including 4G mobile and satellite. Videosoft is headed up by Chief Executive Officer Stewart McCone, one of the industry's pioneering video streaming experts, who brings more than 20 years of experience to the Videosoft...
Foremost road safety and security barrier specialist, Hardstaff Barriers, has launched a free expert advice service as part of its commitment to protecting people and property. The company, which manufactures and supplies vehicle restraint systems (VRS), hostile vehicle mitigation (HVM) barriers, perimeter fencing, concrete security barriers, and access gates, has launched the service to share its extensive industry knowledge. Those who need advice on a project, who are keen to know how certai...
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that despite the difficult year for all businesses, the company was fortunate to see growth in 2020, owing to 59% more sales of optical turnstiles, in comparison to the previous year. While most people began working from home (WFH) early in the year, orders for optical turnstiles, which are typically installed in the lobbies of commercial buildings, continued at a steady pace throu...
Carefully planned safety and security measures will be a crucial part of the successful redevelopment of the high streets and city centers as they seek to reinvent themselves post the effects of the COVID-19 global pandemic, according to security experts, ATG Access. With the Housing, Communities and Local Government Committee informed at a January 2021 meeting that the lockdown-induced shift towards online retail will likely be permanent, the high street must move its emphasis away from retail and instead become more leisure and experience-focused with the help of new pedestrianized zones. Creating new pedestrianized zones Gavin Hepburn, Managing Director at ATG Access commented, “The COVID-19 pandemic has undoubtedly accelerated changes that were already happening in consumer behavior. This presents an exciting opportunity to have another look at our urban landscapes and consider how they might be transformed to better serve the needs and wants of the public.” He adds, “As we saw last summer, pedestrianization is a great way to create new multifunctional spaces for people to gather and socialize. These spaces can be used to provide a much-needed boost to hospitality businesses, or host fun community events, which will be critical when it comes to drawing people back to the high street as things start to return to normal.” Deploying appropriate physical security measures ATG Access report shows 60% of design professionals have concerns about the level of investment in security measures Gavin further stated, “When creating these new spaces, choosing the right physical security measures, such as bollards and impact-tested street furniture, will be crucial in order to ensure that the public can use and enjoy them with confidence. While this may seem obvious, according to our recent research many architects, specifiers, and urban planners feel like not enough is invested in security on the projects they work on.” The report by ATG Access revealed that 60% of urban design professionals have concerns about the level of investment in security measures, while 47% feel that their nearest city isn’t safe. When asked about the barriers to appropriate implementation, the majority (67%) cited insufficient funding, 55% identified reluctance from local authorities to invest, and 32% had experienced a local unwillingness to have the look of a space spoiled by ‘obtrusive security measures’. Solutions to circumvent barriers to security implementation Exploring the potential solutions to these barriers, 53% of those surveyed suggested working in partnership with local authorities and suppliers, right from the beginning of a project, to determine the most appropriate security measures, while 36% were keen to make use of impact-tested street furniture to counteract any aesthetic issues. Gavin concludes by stating, “We all want to see cities and towns bustling with life again once the pandemic comes to an end. Creating new safe, public spaces will be the key to achieving this, so urban design professionals, local authorities, and security suppliers must all work together to bring this new vision to life and ensure a bright future for our high streets.”
Check Point Software Technologies Ltd, a provider of cybersecurity solutions globally, announces the results of an independently commissioned study conducted by Forrester Consulting which analyses the Total Economic Impact (TEI) and benefits that enterprises deploying Check Point’s CloudGuard Cloud Network Security solution can realize. The study found that CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years through higher staff productivity, reduced breach costs, timesaving for developers, and reduced compliance and audit costs. Hybrid cloud deployments Forrester interviewed a CloudGuard user, a large US-based healthcare company To understand the business benefits and cost savings possible with CloudGuard, Forrester interviewed a CloudGuard user, a large US-based healthcare company with annual revenues of over $10 billion. The company chose CloudGuard to protect its hybrid cloud deployments because it was concerned the native services available from its cloud providers are insufficient to secure the protected health information (PHI) which the organization stores and processes. The study found that in addition to CloudGuard delivering agile, seamless security across the customers' hybrid cloud assets, the cost savings, and benefits compared to cloud providers security tools included: Increased hybrid cloud security: The study states that the frequency and costs associated with cloud data breaches are lower with CloudGuard than with native security provided by cloud vendors. The [customer] is confident that Check Point Security meets the company’s needs, now and into the future. Rapid payback and ongoing ROI: CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years and a net present value of $1.25M. Quantified benefits were higher staff productivity, reduced breach costs, timesaving for developers, and reduced compliance and audit costs. Simplified security management: CloudGuard gives single-console visibility and control across the organization's multi-cloud This enables the creation of a consistent centralized security policy, eliminating duplication errors, reducing maintenance work and training needs. Flexible protection for workloads across multiple clouds: The organization can automatically secure workloads, with auto-provisioning, auto-scaling, and automated policy updates. CloudGuard gives continuous visibility, analysis, and control of the customers’ cloud security posture from CI/CD to production. Real-time security compliance: A key concern for the customer was compliance with regulatory mandates such as HIPAA. CloudGuard provides real-time compliance monitoring, improving quality and automating report production, which dramatically reduces auditing work. Multiple cloud services With CloudGuard, they use the same set of tags across multiple clouds After investing in CloudGuard and shifting multiple workloads to the cloud, the customer is now reaping the benefits of utilizing multiple cloud services while not only achieving the same level of security but also reducing the security management costs and providing productivities to developers, stated Forrester TEI study. CloudGuard has enabled the customer to better control the developers’ application of security rules without hindering them. Getting the security right at the beginning has eliminated rework later. The study also stated that confidence in Check Point security leads to more rapid movement to the cloud. Each cloud [service] has its own language. With CloudGuard, they use the same set of tags across multiple clouds and across different accounts and subscriptions. They would have had to manage everything separately if they had done it natively, stated the customer in the study. The customer also stated: “We don’t need to manage 27 different things across three different clouds to accomplish the same task. We have a single management solution in CloudGuard.” Enterprise cloud deployments “Security is often seen as a barrier to enterprise cloud deployments because managing multiple cloud providers’ security controls adds cost and complexity, and traditional security is not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of product management at Check Point Software. “We believe Forrester’s analysis is consistent with what we hear from our CloudGuard customers: it gives them the most secure threat prevention with industry-leading security effectiveness for their hybrid cloud estates, with easy, automated single-console policy management and enforcement. This strengthens their security posture, boosts efficiency, and delivers a rapid, ongoing ROI. This increased cloud confidence allows our customers to migrate more workloads to the cloud, and faster.”
Business owners are being urged to ensure that their vacant properties are as safe and secure as possible to protect them from harm during the latest COVID-19 induced lockdown. The warning comes from globally renowned security barrier experts at Hardstaff Barriers, who specialize in protecting premises against squatters, thieves, arsonists and fly-tippers. On January 4, 2021 the UK Government urged people, once again, not to travel to their places of work and to work from home (WFH) if it is possible to do so. Since then, this has resulted in many more premises being locked up, with staff no longer occupying the buildings and providing a natural deterrence against theft or damage. Temporary concrete barriers, fencing and gates expert Hardstaff Barriers provides temporary concrete barriers, fencing and gates, preventing unwanted vehicle access to sites and buildings 24 hours a day, with short and long-term hire options available. The company’s team of security barrier experts are highly regarded and considered to be among the most experienced in the United Kingdom and are always available to offer a range of free advise on securing vacant property effectively. Contractor for National Barrier Asset framework Hardstaff Barriers is the appointed contractor for the UK Government’s National Barrier Asset framework As trusted experts in the security industry, Hardstaff Barriers is the appointed contractor for the UK Government’s National Barrier Asset (NBA) framework. As part of this important role, the company has installed security barriers at numerous high-profile events and at significant sites, providing robust and reliable protection against vehicle-borne attacks. Securing vacant properties Scott Rose, Business Development Manager at Hardstaff Barriers, said “Vacant properties are an easy target for squatters, thieves, arsonists and fly-tippers, so it is important that security measures are taken into account to ensure the safety of commercial property and land. Not only in terms of access to the land itself but also access to the unit entrances too.” Scott adds, “With no known end to the latest lockdown, properties may be locked up and out of use for many more weeks to come, or even months, so it is vital that businesses have suitable protection in place.”
Heald, an innovator in the field of perimeter security technology and the largest manufacturer of quality security equipment in the UK, has announced a partnership with Singapore-based ESCO Pte Ltd as it continues its international growth. The partnership will strengthen its position as a leading supplier of hostile vehicle mitigation solutions across Asia following installations including the Keppel Marina East Desalination Plant in Singapore. The distributor agreement will grant exclusive authority to ESCO to market and sell the Heald Matador and Viper within Singapore and South East Asia countries including Malaysia, Thailand, Laos, Cambodia, Vietnam, Philippines, and Indonesia, enabling Heald to strengthen its customer support and product offering in the region. High-security solution Heald's modified designs fit individual site requirements and meet the demanding needs of organizations With innovation at the core of Heald, they continue to bring to market unique, patent-protected products from bollards to road blockers. Heald's bespoke designs are made to fit individual site requirements and meet the increasingly demanding needs of organizations that require high-security solutions against the threat of vehicular attack, in particular locations that require shallow or surface mount installs. The director of ESCO Pte Ltd, Sanjeev Bhat, has played a pivotal role in Singapore’s adoption of British security standards and measures having more than ten years of experience in the industry. Singapore has led the way in its commitment to hostile vehicle mitigation with other Asian countries following suit, making it one of the most active security markets in the world. Authority comments Debbie Heald MBE, managing director at Heald Ltd, commented, “We have been supplying to the SEA region for 10 years, however, this collaboration will see the partnership with ESCO offer greater in-country support to our existing customers and also the promotion of our current range and new innovative hostile vehicle mitigation systems to these Countries. These are growing regions with exciting opportunities and we are thrilled to be working with ESCO and our long-term experienced partner Sanjeev Bhat.” Sanjeev Bhat, Director, Hostile Mitigation from ESCO Pte Ltd, commented, “ESCO is a solution-driven business where multiple products are combined to design a one-stop solution to the end-user. Having Heald’s innovative and patented products under our offerings not only widens our product range, but also the range of applications. Our regional presence will facilitate Heald’s presence and position in the region. We are excited at the opportunity to bring Heald’s innovative product solutions to customers within Asia with enhanced technical and after-sales support.”
Interphone has published a security system and building technology whitepaper to help developers, contractors, installers, and managing agents better understand their responsibilities regarding the General Data Protection Regulation (GDPR). The in-depth report, titled A guide to GDPR compliance for the commercial residential marketplace, has been produced jointly with legal training specialist Woolven and Brown to provide an industry-specific look at the data protection and privacy law. GDPR and Data Protection Act 2018 “Security systems and building technologies now hold personal data in many hidden places, so organizations within the commercial residential marketplace need to know what they can and cannot do in relation to holding this information based on the laws that are in place,” explains Charlotte Woolven-Brown, Managing Director of Woolven and Brown Ltd. “The exact requirements can often be confusing, so this guide is designed to help property professionals understand what the GDPR and the Data Protection Act 2018 are and how they apply to their property businesses.” Product-specific policy requirements The white paper provides an introduction to the GDPR, outlining the main considerations for commercial residential property organizations and the impact it may have on them. The guide also covers product-specific policy requirements for those security systems and building technologies that either hold a lot of data or share data with a third party. This includes CCTV, automatic number plate recognition (ANPR), biometrics, voice recognition, door entry, and access control. Process and manage data “The GDPR and the Data Protection Act 2018 have changed the manner in which we process and manage data. Failure to comply could be extremely damaging in terms of potential fines and the threat of civil action, while adverse publicity risks significant damage to the reputation of an organization.” “The advice to property businesses is clear, understand your responsibilities and get it right from the start,” concludes Woolven-Brown. Seeking clarification Julian Synett, CEO of Interphone Limited commented, “Since the introduction of the GDPR, we have had developers, contractors, installers, and managing agents seeking clarification on their compliance requirements for the security systems and building technology we develop, install and maintain.” “This suggests there is still a lack of clarity about what is needed, so we have created this white paper to help answer many of the GDPR questions that property businesses currently have.”
With the spread of coronavirus forcing people to work from home for their safety and health, there are many challenges when operating a business remotely. Not all employers recognize this transformation as positive, while managers oppose this verdict due to the difficulties in controlling remote workers and their productivity. At UVeye, they are in a unique position to see the practical impact in real-time. As working from home can be complicated and even further stressful than working at the office, UVeye has decided to provide its employees with the technical tools and support needed to produce a remarkable boost in productivity while working remotely. Productive work methods UVeye has managed a flexible policy advising most of the HQ staff to work from home To match the productivity stats and even beat them, a few changes were required to be made to assist the employees in making an impact from their office at home. Nevertheless, individuals who work from home report completing more tasks, higher accomplishments, and even discovering better productive work methods. Since the safety of the employees and customers come before anything else, UVeye has managed a flexible policy advising most of the HQ staff to work from home. Using right technology Ohad Hever, Chief Operations Officer: “At UVeye, we adapted quickly to the COVID-19 challenges and ensured our clients and employees are safe and also continue delivering while meeting all deadlines. Our workspaces have been adapted accordingly, and we encourage employees and consultants that can work off-site to do so by providing all the necessary tools.” “One of the things we also moved quickly with was the capabilities to install and maintain some of our systems all around the world using the right technology. We have conducted several online installations guiding local teams and partners with great satisfaction.” Video conferencing session Coronavirus has dramatically changed the industry landscape worldwide. Nevertheless, thanks to the enhanced technological adjustments and employees’ versatility, the number of remote workers at UVeye increases day by day. To help the team stay focused during this work-from-home period while maintaining a good work-life balance, they have grown proper work from home routines, habits, processes, and have together relearned the rules of efficient communication. They have practiced a bi-weekly based video conferencing session on the company level They have practiced a bi-weekly based video conferencing session on the company level, so the employees sense their connection to the organization, in addition to two daily core team meetings to provide the platform to share knowledge, inquire incidents, and raise technical errors. Some of the meetings and internal interrogations occur and are recorded for future implementation on digital tools like Tandem & Zoom. Risk management communicating The operational coordination is conducted via Slack, Salesforce, and Jira. Concerning risk management communicating remotely, they have developed tailored cybersecurity awareness messaging among all of UVeye’s employees while ensuring that all remote access capabilities are tested and secure. While taking into account employee welfare UVeye has sent out several packages and treats to make everyone’s life sweeter and easier during these times. Some of the hardware related employees still need to work in the laboratory and show-room during these times. UVeye’s operation and hardware related employees are required to follow clear safety instructions to avoid the virus from spreading at work and ensure their own safety. Minimizing physical contact COVID-19 has created an unforeseen need for entire workforces to be moved out of their work facilities They have created flexible worksites, minimizing physical contact, and directed everyone to wear face masks while conducting workshops, product maintenance and seminars. UVeye has equipped all working areas and floors in the office with dedicated hand sanitizing stations and have instructed only essential staff to come on-site, in order to decrease the number of people entering the facilities and potentially risking others. COVID-19 has created an unforeseen need for entire workforces to be moved out of their work facilities and into virtual environments. This includes a significant barrier in delivering and the requirement for long-term operations transformation. Regional installation team Work at installation sites must be organized along with the same guidelines that apply to other work environments. While many organizations are reconfiguring interfaces and methods to answer the needs of fully remote workforces, the success of these transformations is often limited by less-than-optimal technologies. The regional installation team needs to be provided with the most accurate guidance possible As safety and technical protocols have to be followed before the system is installed and activated, the regional installation team needs to be provided with the most accurate guidance possible. As a result of this epidemic ‘social distancing’ practices, UVeye has adjusted its operations team to adapt to remote work to complete installations by training the partners’ local teams in the US and Japan. Remote communication applications The major challenge was to identify and predict tasks required due to the physical conditions of the facilities where remote work may be a challenge and develop ways to complete them. To overcome this challenge, they have created reliable and comprehensive methods to nurture the clients’ self-installation abilities, while taking into consideration all of the possible hurdles on site. Shifting from in-person installations to know-how photos, video tutorials, Google Hangouts or Zoom meetings, and other remote communication applications utilized by UVeye to support local supervisors in managing the inspection systems’ installations remotely due to the global crisis. These tools ensure a seamless installation for the field operators who can witness each step via visual guides, live videos, or recordings while managing these remote procedures.
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organized, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognize the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.
COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets, and staff, from physical attack. Fundamentally, it’s the responsibility of the facilities managers and specifiers to incorporate and carefully balance physical security strategies around healthcare sites to protect patients, visitors, property and assets. The challenge is that many of these sites are continually increasing in size and complexity to meet the higher demand from the population. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector to enable it to operate effectively 365 days a year. Effective access control Hospitals are fast-paced environments where life and death outcomes often hang in the balance of only a couple of minutes. Efficient, seamless access is therefore key. All gates and access points around the perimeter must be assessed and considered and these access points should be installed and controlled centrally, or regularly monitored. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector Consider the types of vehicles that require access; the appropriate solution should ensure that, where necessary, emergency vehicles can get in and out of the site unhindered. Effective design for maximum security If automated gates are specified, underground operators are highly recommended to remove any visible signs of surveillance on display. When designing pedestrian and vehicular access: gates should be DDA (Disability Discrimination Act) compliant. Crucially, the design of fencing and gates must accommodate rapid evacuation and access for emergency services. With regards to the car park, it may require rising arm barriers or bollards to secure it. These solutions control access and separate pedestrians from vehicle traffic whilst protecting different buildings, such as specialist units and emergency wards. Promoting wellness through aesthetics Creating a welcoming environment is a core priority when specifying security options for hospitals. Razor or barbed wire may be effective deterrents to potential trespassers, but they create an intimidating and unwelcoming aesthetic, far removed from the sense of wellbeing these developments should promote. A solution that offers both visual appeal and high levels of security is vertical bar security fencing or welded mesh panels. Both provide strong boundary protection and excellent visibility for surveillance, while offering greater protection than other alternatives. Recreational areas For areas requiring a 'softer' appearance, such as gardens and outdoor recreational areas, timber fencing is an ideal option. Timber has a natural, welcoming appearance and promotes a sense of wellbeing and privacy. As well as offering a pleasing aesthetic, it can also provide a high level of noise protection. This makes it well suited for acoustic fencing, which can improve recreational and recovery areas by protecting them from high levels of noise, transforming them into little oases of calm ideal for recuperation. Outdoor storage areas Hospitals and other medical facilities produce a large amount of medical waste which requires secure outdoor areas and bin stores to hold hazardous materials on-site before they're taken away. Hospitals have a responsibility to ensure these areas are secured using risk-appropriate fencing to avoid potentially dangerous materials getting into the wrong hands. Risk assessments Creating a welcoming environment is a core priority when specifying security options for hospitals Risk assessments are key to ensuring a risk-appropriate solution is installed. For facilities at risk of criminal activity, products accredited by standards including Secured by Design or the Loss Prevention Standards Board’s LPS 1175 are proven to reduce the likelihood of crime. It’s also best practice to locate storage areas in areas away from climbing aids such as lamp posts or trees. The fence should also be high enough to deter attempts at climbing. There are many effective and easy-to-install options on offer when it comes to specifying security for healthcare infrastructures. It is important that each site is judged individually. Every institution is different and will require a unique plan of security structures to ensure it is safe for all personnel.
Safety and security have always been primary concerns for those running large events and gatherings, such as at concert venues or soccer stadiums. However, the Manchester Arena attack of 2017 highlighted that more should be done to protect those visiting these locations. This is the standpoint taken by Figen Murray, the mother of Martyn Hett – one of the 22 victims of the devastating attack. She has been campaigning for the introduction of stronger counter-terror security measures at public venues and has succeeded in gaining government backing for ‘Martyn’s Law’. According to the Home Office, the law would require venues to consider the risk of an attack and take “proportionate and reasonable measures” to protect those in attendance. Murray’s proposal would see increased physical security, such as airport-style metal detectors and scanners, become mandatory for major venues that draw large crowds, as well as training, incident response plans and exercises for staff. The law would seek to tackle the inconsistent nature of security practices currently seen at venues, and bring holistic counter-terror practices to the fore. Introducing airport-style security measures at concert venues isn’t a fix-all solution However, introducing airport-style security measures at concert venues isn’t a fix-all solution. The ecosystem of these locations must be considered and responded to accordingly. Adding extra checkpoints in areas with a high flow of people will not only result in additional queues and disgruntled visitors, but may have more disastrous consequences as large crowds are typically the target of terror attacks. Disruptive security measures may move the mass of people from inside the venue, where people will have had to pass through some form of security – if only just a bag check – to outside the venue, where there are typically no security measures in place. Disrupting threats with enhanced security So, what can be done to enhance the protection of those attending these locations? Investment into technology that can provide an additional layer of security without being intrusive is key, and facial recognition is one such tool. Security teams can use this innovative technology to scan crowds or queues for a sighting of a person of interest, whose biometric data is included on a watch list of known individuals. As well as providing an additional layer of protection, this tool can provide peace of mind for security teams who can monitor those who have not yet entered the venue or are waiting outside. When the facial recognition system identifies a potential match, staff must be prepared to act – as the system will never make the final decision over a person’s fate. They can analyze the picture from the watch list with the video of the individual identified, decide whether the detection was accurate and then interact directly with the person of interest. The level of contact may be as simple as asking for proof of identity and if adequately able to verify who the person is, no further action is needed and any biometric data is removed. Alternatively, it could lead to the acquisition of a known criminal, providing valuable intelligence of any immediate threat. When the facial recognition system identifies a potential match, staff must be prepared to act The real benefit of facial recognition is that response can be proactive as well as reactive, whether it be from fixed surveillance cameras or mobile devices such as body worn cameras. Devices capable of live streaming coupled with analytics such as facial recognition, offer an invaluable surveillance tool, allowing security teams and first responders to react quickly and more effectively to an unfolding situation, all in real-time. Control centre staff are still vital in this circumstance, but are able to work with heightened situational awareness thanks to the live streaming aspect. It allows them to more accurately assess a situation and therefore make decisions based on all of the information at hand, with outcomes that will be far more effective. For example, the information relayed to the emergency services will be more exact in terms of what happened, where and who was involved – rather than being based on fragmented eyewitness accounts. Planning ahead Even though it isn’t yet official, Martyn’s Law is already making waves in the industry – with Manchester City Council pledging to adopt the law early and the security minister, home secretary and prime minister all “100% behind” the proposal. Despite its early stages, operators of concert venues and stadia must start forward planning and enhancing security measures ahead of the government beginning to consult on the law in the spring. Only time will tell what the full legislation will entail, but we can all agree that action is necessary. In order to be as effective as possible, the law should not only mandate metal detectors and bag searches, but technology such as facial recognition and body worn cameras that can work to enhance these other measures and elevate the human response.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal employees are impacted, some on full or partial leave as a result of the shutdown and others working without knowing when they will get paid. Cybersecurity Initiatives Delayed Furloughed federal employees tasked with cybersecurity are not on hand to address the constant threat to government IT systems from possible hackers and other bad actors. In fact, hackers may decide the government shutdown is a vulnerable time to launch an attack. Data capture form to appear here! Hackers may decide the government shutdown is a vulnerable time to launch an attack Specifically, the new Cybersecurity Infrastructure Security Agency, launched last fall, is operating with a skeleton staff. If the shutdown encourages cybersecurity experts to seek other employment, the resulting drain of “knowledge capital” could be a lasting detriment. New cybersecurity initiatives are also being delayed, such as the 21st Century Integrated Digital Experience Act, aimed at creating a baseline of security defense across government web sites. Some government websites have had their Transport Layer Security (TLS) encryption certificates expire during the shutdown. Impact On TSA Agents Although Transportation Security Administration (TSA) agents remain on the job at major airports, they will not be paid again until after the shutdown is over. The resulting negative impact on morale has arguably slowed down airport security operations, although airports have not reported any major problems. In addition, some agents have called in “sick” and/or sought other employment to provide income during the shutdown. In the Dallas-Fort Worth airport, the number of agents calling out sick reportedly increased by 200% to 300%. The absences can aggravate existing TSA staffing shortages. Impact On Border Protection Agents Customs and border protection agents are also on the job with no assurance of when they will be paid. Other immigration agents in the Department of Homeland Security are also currently without pay. Hearings on immigration cases are being canceled, which can result in a large backlog to be addressed after the shutdown ends. Customs and border protection agents are also on the job with no assurance of when they will be paid What About Worker Documentation? A consequence of the shutdown is unavailability of the government’s E-Verify system, which is used to verify a worker’s immigration status prior to being hired by an employer. During the lapse in government appropriations, employers will not be able to access their E-Verify accounts, create an E-Verify case, edit company information, terminate accounts, run reports, etc. Long-Term Impact On Government Employment The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere The shutdown may lead federal employees to seek work in the private sector, where their paycheck is not likely to be delayed because of a political impasse. The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere, whether on a temporary basis or as a permanent alternative. Manpower shortages can translate into security risks. Trump has argued for funding of the border wall on security and humanitarian grounds and has sought to put pressure on newly empowered Democrats. However, adding physical barriers at the border is only part of the solution to border security, says the conservative Heritage Foundation. Also needed are improved technology to monitor the border and appropriately equipped border patrol agents. Holistic Approach To Border Security This holistic approach of combining barriers, technology, and people is the cost-effective way to secure the border, says Heritage Foundation. It’s also important to enforce immigration laws, and border security does nothing to stop visa overstays, another source of illegal immigration. The Democratic opposition has said Trump’s urgent call to build the wall is a “manufactured crisis,” and the wall would be “immoral” and “ineffective.” Weeks into the impasse, there is no end in sight.
ASSA CLIQ® Remote has proven to be the perfect partner for the Hean Castle Estate in southwest Wales, delivering assured key control and much-needed flexibility when managing access control across the site. Covering over 1,200 acres, the Hean Castle Estate owns and manages a diverse portfolio of land and property around the village of Saundersfoot in Pembrokeshire. The Estate operates a range of different enterprises, including beef farming, forestry and biofuel production, two substantial holiday caravan parks, and a beach center, together with a significant portfolio of leased commercial properties. Challenge Previously, the Estate used a mechanical master key system, which posed a number of specific challenges. The first of these was around lost keys, with one lost key potentially compromising the entire system. The second challenge was around the inflexibility of the mechanical master key set-up. Due to the number of different departments on the Estate and the areas they each required access to, this often involved members of staff having to swap keys or members of the management team having to attend remote sites in order to provide access. Solution Enables granting key holders, regardless of their location, remote access to properties and facilities on the estate The solution was ASSA CLIQ® Remote from the ASSA ABLOY Door Hardware Group. Supplied and installed by local distributor Lock-Tech, ASSA CLIQ® Remote is an award-winning electromechanical solution, using high-end micro-electronics and programmable keys and cylinders to help the Hean Castle Estate stay in control of access rights across the site, at all times. The solution enables the team to grant key holders, regardless of their location, remote access to properties and facilities on the estate, saving time and money around key control. The system was first installed in the Estate’s administrative office and a series of adjoining workshop buildings and has been expanded across Hean Castle Estate ever since. Almost 80 cylinders and padlocks have been fitted across the site, with 40 CLIQ® keys in use and seven wall PD units installed, which allow users to update their key credentials without having to visit an administrator. Positive feedback David Lewis, Trustee at Hean Castle Estate, explains: “ASSA CLIQ® Remote has proven to be a great success across the Hean Castle Estate. Firstly, lost keys are no longer an issue. For instance, we had one case where an employee forgot to return their key when leaving the business. With ASSA CLIQ® Remote, this problem was quickly remedied, by simply revoking their access rights. From a security and peace of mind perspective, it’s difficult to fault.” “Secondly, the ease with which access rights can be set up is a big benefit. For example, we programmed the system so that our staff’s access credentials end half an hour after their shift has finished. And with many different contractors, such as electricians and engineers, visiting our site, ASSA CLIQ® Remote lets us give these professionals access to only the areas they need. In comparison, with a mechanical master key system, a member of our team would have to escort them to the building and wait for the job to be done. Given how geographically dispersed the Estate is, this would waste a lot of our team’s time, but this is no longer an issue with ASSA CLIQ® Remote.” ASSA CLIQ® We have worked with Lock-Tech for a long time and always receive excellent service" “Finally, as the Estate expands, the ASSA CLIQ® Remote system can grow with it. The system is now simply part of the infrastructure of the Estate; should we need more cylinders or padlocks added to it, then this is an easy and hassle-free process. We have worked with Lock-Tech for a long time and always receive excellent service, and the same can be said of ASSA ABLOY too, who have been very quick to respond to any questions we may have.” Nojmol Islam, Category Product Manager – El Mech & New Technologies at the ASSA ABLOY Door Hardware Group, adds: “We are delighted with the success of the ASSA CLIQ® Remote system at Hean Castle Estate. It’s a perfect example of how versatile the solution is, with it being used in a range of applications, from outbuildings and doors to gates and residential properties.” “This includes ASSA CLIQ® Remote’s weatherproof padlocks, which have been fitted to a number of gates and car park barriers across the site. Meeting the highest rating for IP68, these padlocks are ideally suited to withstand harsh outdoor conditions, in applications that are exposed to the elements all the year round.”
The DSC550 was tested to the new ASTM F2656-20 standard which measures the penetration level from the foremost edge of the barrier versus the back-side of the barrier like the previous standard. This can provide a difference of (1.52 m.) and makes the negative penetration level even more impressive. Design and features The DSC550 Open Frame barrier features a shallow foundation of only 24 inches (61 cm). The open-frame design additionally provides a unique counter-balance design with no springs that need extra maintenance. The DSC550 alleviates the concerns of interference with buried pipes, power lines, and fiber optic communication lines in urban applications. The shallow foundation also reduces installation complexity, time, materials, and corresponding costs. The DSC550 is perfect for high water table locations and areas with corrosive soils. Installation The barrier was fully operational after the force of the M50 impact. The fact that no-assist devices are used to operate this electro-mechanical barrier is something totally new to the industry. In addition, the fact that little rebar is needed in the very small foundation is a win for integrators trying to earn a solid margin while installing the DSC550 and a win for the end-user with little disruption during installation. Emergency fast operation The new DSC550 provides an emergency fast operation of 1.5 seconds for electro-mechanical and 0.75 seconds for hydraulic operations. This allows a guard to quickly react to a perceived threat with the peace of mind knowing the barrier will deploy in a rapid manner under the most demanding scenarios. The DSC550 also provides intuitive touchscreen controls with data-logging and custom programming.
Bosch Building Technologies has installed an intrusion alarm system at the UNESCO World Heritage Site: the Mausoleum of Qin Shihuangdi in the city of Xi'an, China. Several hundred TriTech motion detectors are deployed to protect the 16,300-square-foot museum against theft and damage. These detectors prevent costly and time-consuming false alarms under challenging environmental conditions while providing detection reliability of real alarms. Because of the highly efficient intrusion detection system, the museum can dispense entirely with physical protective barriers such as glass walls, allowing visitors to directly experience their clay heroes. “The cooperation with Bosch is an excellent showcase of modern high-tech protection of historic buildings. Bosch intrusion alarm systems help to upgrade the security level of these unique historic sites,” says Ren Xuxin, Project Manager of Xi’an Terracotta Warriors and Horses Pit Security Upgrade Project. Intelligent alarms protect millennia-old warriors As wall detectors, the TriTech motion detectors protect the pits where the terracotta warriors are located. Because these pits collect large amounts of dust that could cause false alarms, the intelligent sensor data fusion algorithm in each of the rugged detectors checks potential alarms with a PIR sensor and microwave Doppler radar for a consistent result. The area to be protected is thereby also secured from above by ceiling-mounted TriTech motion detectors. These detectors are located 4.8 meters above the museum floor, yet operate accurately and reliably. They thus exceed the range of standard ceiling detectors by more than two meters. The TriTech motion detectors provide round-the-clock protection for the museum In the event of a security breach, the Bosch G-Series system controller sends an alert, including the location of the triggered detector, in less than two seconds to the security team in the control room, which uses live images from a video system to verify the alarm. Round-the-clock protection In most cases, tourists trigger an alarm when they cross a threshold to retrieve their cameras or smartphones that have accidentally fallen into the pit. In doing so, there is a risk of damage to the terracotta warriors, but even if real criminals should ever get into the act, the system is ready. The TriTech motion detectors provide round-the-clock protection for the museum. Due to their discreet design, the detectors are unobtrusive and thus do not interfere with the museum experience. In accordance with the museum operator's list of requirements, the intrusion detection system protects not only the museum, including the perimeter, as well as the visitor areas of the mausoleum but additionally the cultural treasures currently stored in the unmanned warehouse.
Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-the-art biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a globally recognized company in any high security facility services, anywhere in the world. Enhanced security No high street bank or any safe deposit center can match Sovereign’s credentials and the extraordinary security levels that they have achieved. People across the country have been targeted for their valuables, not only on the streets, but also in their homes. Challenges were to offer a complete peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader). Matrix Access Control solution Matrix Access Control solution is designed to address security concerns in a professional and systematic method Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps in enhancing security, along with barriers and door controllers. Matrix Access Control solution is designed to address security concerns in a professional and systematic method, without compromising on hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card, in order to provide the visitor with access to restricted areas, as per the below criteria: 2-Person rule: This is enforced by requiring the presence of at least two authorized persons Route based access: This allows user to access the authorized route only Anti-pass back: This restricts to enter a secured area second time without first leaving it Result: Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication Boost customer satisfaction Matrix products offered include: COSEC VEGA CAX integrated with turnstile COSEC PVR DOOR CONTROLLER COSEC PANEL LITE COSEC PATH Series COSEC ARC DC100P
The city of Arnhem has chosen Nedap to regulate vehicle flows and to provide a seamless vehicle access experience in its city center. Due to the increase in the number of vehicles in the city center, it was a challenge for Arnhem to ensure that the traffic flow runs smoothly and safely, to keep the historic and tourist center accessible and livable. Vehicle identification solutions With the implementation of Nedap’s vehicle identification solutions, authorized vehicles and drivers can access the city in a safe and seamless way. The combination with Nedap’s MOOV City Access software ensures that vehicle access in the city center easily can be regulated. The city of Arnhem wants to regulate vehicle access to the center and ensure only authorized vehicles can enter The city of Arnhem is located in the east of the Netherlands. Because of the historical center, cultural sights and a wide range of entertainment facilities, it is also an attractive city for tourists. To ensure that the city center remains traffic and pedestrian friendly, the city of Arnhem wants to regulate vehicle access to the center and ensure only authorized vehicles can enter. MOOV City Access platform By limiting traffic flows, the narrow streets in the historic center of Arnhem turned into an attractive and safe public place for pedestrians and cyclists, creating a livable city. The city of Arnhem has chosen Nedap for its MOOV City Access platform combined with its advanced solutions for automatic vehicle identification, based on long-range RFID (Radiofrequency Identification) and ANPR (Automatic Number Plate Recognition) technology. Authorized vehicle access in specific zones The solution is supplied and installed by Nedap’s partner - ST&D. Nedap’s MOOV City Access platform is implemented to control vehicle access in specific zones. With this, Arnhem ensures that only authorized vehicles can enter these zones and only if they have permission to do so. With the implementation of RFID readers and ANPR cameras, vehicles can be identified from a long distance, ensuring automated and safe vehicle throughput. Nedap’s long-range RFID solution, TRANSIT will be used to ensure that local residents, emergency vehicles, licensed taxis and municipal services have easy access to the city center, without compromising on safety. TRANSIT long-range RFID solution Authorized vehicles equipped with a RFID tag will have fast access at vehicle entrances TRANSIT is a proven technology that enables highly secure identification and tracking of vehicles and drivers, up to a distance of 10 meters. Authorized vehicles equipped with a RFID tag will have fast access at vehicle entrances, without the need to stop. The all-in-one license plate camera, ANPR Lumo will grant access to vehicles based on their license plate number. License plate recognition is a perfect solution for specific user groups or situations, in which vehicles require access temporarily or incidentally to the city center. For example, retail delivery trucks can be given access at pre-defined locations, assigned days and time zones, regulating vehicle access to the city by reason. Digitization of city access “By choosing and implementing Nedap’s MOOV City Access platform in combination with Nedap’s license plate recognition solution, we have taken a major step in the further digitization of our city access in Arnhem,” said Hans ten Barge, Chain Director Parking at the Municipality of Arnhem. Nedap Identification Systems is a specialist in Automatic Vehicle Identification and Vehicle Access Control solutions, for over the past decades. Nedap has developed a unique portfolio of proven long-range RFID and ANPR solutions that enable seamless third-party system integration. Vehicles and drivers are identified automatically, securing a free-flow yet highly secure vehicle access experience. MOOV City Access is Nedap’s vehicle access control solution, specifically designed for regulating vehicle flows in inner cities. MOOV’s hardware and software are compatible with Nedap’s RFID readers and ANPR cameras. This complete solution ensures a livable and safe city.
HID Global, a pioneer in trusted identity solutions, announces that aerospace company Avolon has selected the HID Mobile Access® solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos® credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Maintaining secure perimeter Avolon is one of the aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID® readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility" “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, facilities project manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Touchless access control The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralized, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organizations in today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
Sometimes you see it coming and want to scream out: “Don’t do that.” We all make mistakes, but it’s hard to sit and watch others as they go down the wrong path. It’s especially difficult when the errant party is a customer, and when their wrong move might somehow end up reflecting badly on you as a technology or security systems provider. Much better to anticipate the problem by expecting the possible mistake before it happens. We asked this week’s Expert Panel Round Table: What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems?
There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximize their successes throughout the world. We asked our panelists this week to comment on how they see globalization impacting the physical security market. Their broad-ranging responses emphazis the opportunities and challenges of succeeding the global marketplace.