The Security Industry Association (SIA) and SecureIDNews have selected five distinguished biometrics and security experts as the 2020 winners of the Women in Biometrics Awards – a globally recognized program co-founded by SIA and SecureIDNews and co-presented with sponsors IDEMIA, Biometric Update and the SIA Women in Security Forum. The honorees will be recognized during the 2020 SIA GovSummit, SIA’s annual government security conference, which will be hosted as a free virtual even...
In 2020, with the continuous spread of the COVID-19 pandemic, millions of people have been infected around the globe. Touchless security devices In these uncertain times, with the ever-increasing demand for touchless security devices, Anviz, a globally renowned biometric security solutions firm, offers the latest touchless solutions - iris and face recognition access control terminals. The company’s latest iris and face recognition access control terminals help reassure business owners,...
The new DoorBird IP video intercom provides an option for adding access control via an ekey fingerprint scanner. The D2101FV EKEY door station is equipped with a cutout for installing the ekey home FS UP I fingerprint reader. Visitors and homeowners can use all the functions of the smart intercom immediately after installation including opening doors via app or RFID key fob. Once the ekey module has been mounted, access can also be granted by fingerprint. The DoorBird app controls, RFID reader a...
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance syst...
To meet the evolving design needs of the diverse and growing market for biometric access control solutions, the globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced the expansion its fingerprint authentication touch sensor portfolio for physical and logical access devices and applications. FPC1025 sensor access module To enable maximum flexibility in product design, the new FPC1025 sensor version from Fingerprints has a smaller footprint than the other models...
In case of a large multi-national retailer or a smaller high-street retail store, security will be near the top of their list of priorities. In fact, the safety of visitors and staff, coupled with the security of goods, can be vital to any retailer’s success and profitability. CLIQ technology from the globally renowned security provider, Mul-T-Lock Technologies Ltd. offers a smart security solution for all types of retail applications, whether it be a chain of supermarkets or a standalone...
Organizations globally are facing an urgent need to rapidly onboard hundreds of key employees, such as medical staff, nursing staff and other staff members, on a daily basis across multiple facilities and sites. HID Global, a worldwide renowned provider of trusted identity and identity management solutions, has introduced an emergency badging solution to help manage the secure issuance and administration of staff badges and access control credentials for employees as they navigate the current global health crisis. HID FARGO Connect solution HID Global’s offering combines its award winning HID FARGO Connect solution for cloud-based ID card printing with its latest innovation for cloud-based identity management solution to equip organizations with a convenient “touch-free” system that minimizes the impact on overwhelmed credential issuance departments and drives a more secure work environment. Administrative and security challenges that have emerged among industry sectors such as healthcare institutions, government agencies and other organizations providing emergency services include: Inefficient access management processes that require manual sign-in and sign-out process. Overwhelmed IT departments that have had to adjust their credential issuance systems. Restricting access to in-demand items such as medical equipment and PPE (Personal Protective Equipment), and safeguarding against theft. Emergency badging solution HID Global’s emergency badging solution includes the tools required to issue secure credentials to temporary employees, such as: HID FARGO desktop card printer for ID and card issuance. FARGO Connect Console for badge issuance and management. A free, six-month subscription to HID FARGO Connect and the company’s cloud-based identity management platform. Consumables, cards, and subscriptions to HID Global’s applications and secure cloud environment for quick and convenient badge operations deployment.
Ping Identity, the globally renowned intelligent identity solutions provider for the enterprise, has announced that Candace Worley has joined the company’s leadership team as Global Chief Poduct Officer. Worley brings over 25 years of enterprise strategy and product development experience from some of the largest names in the technology sector. At Ping Identity, Worley will be responsible for advancing the global product vision, pushing technical product innovation efforts and bringing the company’s premier identity solutions to market. Cloud infrastructure expert Worley hails from Amazon Web Services (AWS) where she most recently led the enterprise strategists and vertical marketing teams. Additionally, she developed enterprise level messaging, marketing plans, and industry insights that help customers accelerate time to value for their cloud transformation projects. Prior to joining AWS, Worley held key product management and chief technologist roles at McAfee and Intel Security. There she served as GM, Chief Technologist, and VP, driving thought leadership and advancing technical innovation in McAfee security solutions, and led a sales specialist team responsible for evangelising Security Operations Center (SOC) solutions. Digital customer identity transformation solutions Candace has deep expertize in enterprise security strategy and an acute understanding of the innovations" “Candace has deep expertize in enterprise security strategy and an acute understanding of the innovations that businesses require to drive digital customer identity transformation, large enterprise hybrid IT models and workforce enablement in the new economy,” said Kris Nagel, Chief Operating Officer at Ping Identity. Kris adds, “As Ping Identity remains focused on the identity-defined security revolution, Candace’s product development leadership will be critical in evolving the company’s product suite and ensuring secure and trusted identity authentication is ubiquitous.” Trusted identity solutions “Identity is now the foundation of all things digital,” said Candace Worley, Chief Product Officer, Ping Identity. He adds, “Ping’s commitment to guaranteeing that all digital transactions are as secure in the digital world as they are in the physical world stands out as the type of mission that gets me excited. I’m looking forward to progressing Ping’s goals and pioneering enhanced digital, contactless and mobile product capabilities.”
InfectProtect unveils a pioneering new access security product to help reduce infection within the workplace, allowing businesses to reopen safely in these uncertain times. SteriSecure SteriSecure is a bio-security device which integrates into a buildings current access control system to ensure 100% of people who gain access have clean, sanitized hands. It works as a relay device that sits in-between the access control panel and the entry method (door, turnstile, etc.), only passing on the unlock signal once both hands have been successfully coated with hand sanitizer. Bio-security product Unlike standard automatic hand sanitizer dispensers, SteriSecure has 4 spray nossles, two on top and two on the bottom, which ensure that users hands are fully coated and speeds up the application time allowing up to 30 uses per minute. This patent pending solution has been specifically designed to help prevent the spread of disease and infection This patent pending solution has been specifically designed to help prevent the spread of disease and infections and has already decrease staff sicknesses rates over a year by 80%, prior to the COVID-19 outbreak. Cost-effective sanitising solution Meaning one device could save a 100 person organization over £60,000 per year in lost productivity, and with the stats currently showing 1 in 5 people who catch Covid-19 become seriously ill, being able to prevent the virus from entering or spreading within workplaces is more important than ever. Co-Founder, SteriSecure , Michael Howe, said “As the government starts to look at moving towards reopening our country, it’s vital that businesses put in place systems like SteriSecure to make sure their workplace is a safe environment for their staff and customers. At the end of the day so many people have been personally impacted by this pandemic, it’s every company’s duty to make sure they don’t do anything that potentially feeds the next wave of the outbreak.” SteriSecure units can be purchased directly from InfectProtect, but the company is currently looking to expand their national and international partnerships with specialist distributors and installers.
ASSA ABLOY’s Architectural Door Accessories Group has released a series of new hands-free door opening solutions to reduce the number of skin-to-surface touch-points people meet throughout the day. Rockwood hands-free door pulls Rockwood arm and foot pulls are easy-to-install, cost-effective options for hands-free door operation in new or pre-existing openings, which has become a major consideration for facility managers, owners, tenants, employees and the general public to minimize the spread of germs and bacteria. “Retrofitting existing spaces to help maximize employee and customer safety is on everyone’s mind as businesses and organizations start to develop their return to work plans,” said Cris G. Post, General Manager of Rockwood Products, ASSA ABLOY Architectural Door Accessories. Cris adds, “We’ve seen incredible demand to bring a high-quality, durable, cost-efficient solution to the market and we are rapidly deploying to customers across North America.” Hands-free door hardware Limiting contact and exposure with hands-free door hardware has become an important defense According to a recent Qualtrics report, the majority of people said they currently do not feel confident going to a restaurant (68%), go shopping (51%), or attend a sporting event (79%). When it comes to returning to work, 66% of people would feel uncomfortable right now and 74% of people agree that they want their work facility cleaned and disinfected regularly upon return. Despite that level of discomfort, many organizations are planning to reopen soon. Limiting contact and exposure with hands-free door hardware has become an important defense in reducing risk for building occupants and guests. Maximizing employee and customer safety “ASSA ABLOY has always been committed to providing life safety and security solutions, and that’s become even more important in today’s environment,” said Doug Thompson, President, ASSA ABLOY Architectural Door Accessories and Glass Solutions. Doug adds, “The Rockwood team dramatically accelerated our product development pipeline to deliver this solution quickly to customers, helping them prepare to re-open schools, offices, restaurants, stores, and other public areas safely.” Rockwood Hands-Free Arm and Foot Pulls consist of sturdy stainless steel and are easy to install on wood, metal or aluminum doors. Additionally, they complement ADA standards and regulations to ensure all openings remain accessible to everyone.
The Security Industry Association (SIA) is now accepting applications for its new scholarship program, the SIA Women in Security Forum Scholarship program. This initiative, developed by the SIA Women in Security Forum, which offers programs, professional development opportunities and networking events to support the involvement of women in the security industry, will offer multiple scholarships worth at least US$ 3,000 each to further educational opportunities for awardees and help them thrive in the industry. Women in Security Forum Scholarship program SIA created the Women in Security Forum Scholarship program to support SIA members’ professional development and educational goals. The funds may be used towards: Registration for SIA education or certification programs and/or conferences Registration for other industry education and certification programs or webinars Tuition for accredited trade, vocational or academic degree programs related to the security industry Repayment of student loan debt The SIA Women in Security Forum works to grow and retain leaders in the security industry" “The SIA Women in Security Forum works to grow and retain leaders in the security industry,” said Gloria Salmeron, Director of Human Resources at Brivo and Co-Chair of the SIA Women in Security Forum Scholarship Committee. Gloria adds, “With the addition of this new scholarship, we look forward to helping bring opportunities for further education and advancement to as wide a spectrum of people as possible and inviting individuals to participate in the Women in Security Forum.” SIA’s Women in Security Forum SIA’s Women in Security Forum works to engage all security professionals to promote, recruit and cultivate the leadership of women for a more inclusive and diversified industry. The forum’s key efforts and activities, in addition to the scholarship, include the SIA Progress Award, which celebrates individuals who advance opportunities and pave the way to success for women in the security industry. Women in Biometrics Awards It also includes a quarterly virtual education series, collaborative projects with other organizations that seek to empower women in the security and technology fields, sponsorship of the Women in Biometrics Awards, which recognizes distinguished female leaders in the biometric identity and security industry, thought leadership opportunities, and engaging networking and professional growth events. The SIA Women in Security Forum is open to all employees of SIA member companies. The SIA Women in Security Forum is open to all employees of SIA member companies “The launch of the SIA Women in Security Forum Scholarship program is a key element of our career development program to foster a path to success for individuals currently working in the industry and students who may one day lead our industry,” said SIA CEO Don Erickson. Criteria for SIA Women in Security Forum Scholarship Each applicant for the SIA Women in Security Forum Scholarship must be either, 1) A SIA student member enrolled in an accredited trade, vocational or higher education academic degree program related to the security industry, or 2) A member of the SIA Women in Security Forum and an employee of a SIA member company with at least two years of professional experience in the security industry. Applications for the 2020 SIA Women in Security Forum Scholarship must be submitted by Monday, June 15, 2020 with winners slated to be announced in late July 2020. SIA is accepting donations from SIA member companies and individual members to help support the SIA Women in Security Forum Scholarship program.
Detection Technology, a globally renowned provider of X-ray detector solutions, has unveiled the industry’s first off-the-shelf detector subsystem for security CT (computed tomography) applications. CT plug-and-play-type subsystem The plug-and-play-type subsystem, branded as Aurora CT, includes ready-made, multi-slice detector boards and a data acquisition system (DAS). Aurora CT speeds up time-to-market and decreases total costs of X-ray imaging systems that meet the most stringent security equipment standards in aviation, such as ECAC EDSCB C3, ECAC EDS Standard 3.1, and TSA AT-2 TIER II. “We have a comprehensive track record as the most trusted provider of customized detector solutions for security CT applications, and now we are positioning ourselves as the first in the industry to offer standard solutions for this high-tier segment,” said Tomi Fält, Manager of Product Management at Security and Industrial Business Unit, Detection Technology. Off-the-shelf CT detector solutions Our Aurora-branded multi-slice X-ray detectors and control unit provide accurate data for 3D CT imaging systems" He adds, “We have identified an increasing demand for off-the-shelf CT detector solutions, which enable rapid and cost-efficient system development, yet meet the latest regulations and standards in every detail. Security CT systems offer plenty of features to enhance aviation safety and passenger experience.” Tomi further said, “Our Aurora-branded multi-slice X-ray detectors and control unit provide accurate data for 3D CT imaging systems that detect the contents of bags without the need to remove electronics or liquids from the bags. In Aurora CT design, we have also paid attention to planned next-generation standards, and have ensured that the design is future-proofed.” 3-sided tileable detector modules The 3-sided tileable detector modules easily scale from 16-slice up to 64-slice system configurations to cover a wide range of set-ups, from entry-level checkpoint carry-on baggage scanners to large hold baggage CT scanners. In addition, air cargo and other critical logistics applications can be boosted with the Aurora CT subsystem. The modules are available in flexible single-energy constructions, which also support dual-energy configurations. The high integration level of detector modules improves mechanical robustness and imaging performance. Withstanding G-forces of rotating CT systems The whole detector system withstands G-forces of rotating CT systems up to 20G. Furthermore, the design selections ensure very high radiation hardness for long product lifetime. Tomi said, “In Aurora CT, we have utilized our previously launched, well-proven Aurora platform. The platform is powered by a 20-bit, application-optimized single-chip ASIC that effectively mitigates the impact of external interferences.” “All our Aurora-branded solutions have a big heart in a small package. Aurora CT provides superior image quality and a fully digitalized data path in the most robust, modular and easily scalable platform”. Aurora CT detector subsystem Aurora CT detector subsystem comes with sparse and full pixel matrix options Aurora CT detector subsystem comes with sparse and full pixel matrix options. The detector matrix is built on individual low-noise BSI (backside-illuminated) photodiodes for ultra-low crosstalk and low noise to meet high spatial resolution and penetration performance requirements. The scintillator matrix has high light output, and is practically afterglow-free to ensure high image quality without artifacts at fast scanning speeds. Optical, high-speed datalink The Aurora CT detector subsystem includes X-DCB (data combiner board) as an essential part of the DAS. Precise synchronization with a rotating gantry can be implemented with flexible encoder interface. Aurora CT features an optical, high-speed datalink from the data acquisition system to a host computer. This is a proven solution for system integration with the data transmission over rotating slip ring. Support for remote firmware updates Aurora CT detectors and X-DCB support remote firmware updates for smooth system development and possible adaptation to new requirements. In addition, various development and diagnostics functions are included to confirm the status and monitor health of the detector system. A software library is available to support rapid integration of the inspection system. Furthermore, Detection Technology provides global support to facilitate and accelerate the system design phase and detector integration. The Aurora CT subsystem is available for volume shipments, and inquiries about the development kit can directed to the company.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the smart system should be able to prevent theft and timely detect people climbing over the perimeter fence. Secondly, the intelligent security system should provide comprehensive monitoring in the whole industrial park and inside the factory unit, which includes, monitoring of production line and employees’ smoking behavior during working hours at office areas, efficient employee attendance management, vehicle identification at the entrance and exit areas of the park, and the overall management of all the devices, data report outputs, and other facilities at the industrial park. Total smart solution The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the intelligent system also supports further device upgrade based on customer’s future plan for the next several years. Dahua 5MP WDR IR Bullet AI Network Cameras To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. AI-powered perimeter protection The combination of advanced AI analytics and real-time alerts to desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. Intelligent Video System analytic algorithm As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Dahua face recognition barriers Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. 2 Megapixel Full HD AI Access ANPR cameras The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognize the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle color detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. Dahua DSS PRO management platform The Dahua DSS PRO management platform integrates all cameras and the stated devices At the management center, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Smart industrial park solution Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost,” said Zhao Shengbo, Regional Director of Dahua CIS. Upgrading access verification system Zhao adds, “Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation.” “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Comelit has continued its work with multi award-winning London property developer, Howarth Homes to present new homeowners at office-to-residential conversion, Lovell House with smart access control and door entry. Lovell House, located off Uxbridge High Street in Middlesex is a stunning collection of 45 executive suites, one and two bedroom apartments set over six floors, each finished to a high specification. Smart access control and door entry system Each apartment has been individually planned to ensure a light and airy interior with excellent accommodation flow. Within the initial design process, Comelit was invited back to work with Howarth Homes to accommodate a request for smart security right from the point of entry to individual apartment access. Linzie Howland, Sales Director of Howarth Homes stated, “Howarth Homes is adept at creating affordable option developments interiors that demand more than just cursory attention. Every detail in each of our developments has been carefully and thoughtfully considered to ensure that our new home promises easy, hassle-free living”. SimpleKey access control solution Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets Linzie adds, “Lovell House is testament to this commitment, and commands superior specification right from access control through to door entry. We have gone above and beyond the expected to ensure homeowners can take advantage of purchasing offers and live in a development where we present smart security and visitor management without compromising aesthetics.” Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets in every apartment, allowing visual door entry operating through its 2-Wire SimpleBus solution. The powerful combination presents homeowners with the capability to answer access requests and manage home access. Comelit access control readers installed Each of the five floors has an access control reader installed alongside each lift facility, totaling 19 units around the site. The development itself is finished with a bespoke stainless steel panel with bezel design. All systems have been designed and installed to comply to Secured by Design standards. Tom Kidston of Excellence Electrical said, “Howarth Homes prides itself on its pledge for connected living for a connected world, so it’s essential access control and door entry is planned into the specification and design”. Residential security systems Tom added, “This is especially important at office to residential conversion works such as Lovell House, where systems need to be considered with the change of purpose to the building. Early planning ensures a coordinated approach to installation, with minimal cabling requirements to remain compliant, stylish and secure.” Daniel (Dan) Wood, Southern Sales Manager at Comelit UK said “Uxbridge is increasingly growing in demand for first time buyers and rental property, experiencing excellent capital growth. Howarth Homes has a number of developments in the area and we have been thrilled to work closely with them to deliver total solutions for access control and door entry”. Dan adds, “At Lovell House, the specification brief was to create futureproof, smart security and visual visitor management, delivered seamlessly with our SimpleBus and SimpleKey systems.”
Nottingham-based manufacturer and supplier of protective systems, Hardstaff Barriers announced that it has completed the installation of a hostile vehicle mitigation system at the site of the Nightingale Hospital in Harrogate, North Yorkshire. The hospital is one of a series of temporary facilities which have been built around the United Kingdom to add additional bed capacity to the NHS (National Health Service) during the COVID-19 pandemic. Linear surface-mounted concrete security barriers Appointed as part of its role as the designated National Barrier Asset delivery partner, Hardstaff Barriers, which is part of the wider HS Security Group, has installed temporary linear surface-mounted concrete security barriers, as well as a gated access system, across the site. The system, which was installed overnight, is designed to especially mitigate threats such as hostile vehicle attacks and protect against reckless or accidental damage from vehicles to the site’s workforce and buildings. Hostile vehicle mitigation system installed Fellow HS Security business, ATG Access was also recently commissioned to protect the Nightingale Hospitals The project at the Harrogate Nightingale Hospital is the latest in a series of related developments for HS Security Group, a group of the UK’s renowned physical security specialists, owned by Hill & Smith Holdings PLC. Fellow HS Security business, ATG Access was also recently commissioned to protect the Nightingale Hospitals at both the London ExCel and the Cardiff Principality Stadium. Enhanced security for Nightingale Hospitals Kathryn Cooper, Service Manager at Hardstaff Barriers, said, “The NHS is doing a fantastic job of caring for and protecting the people of the country at this most extraordinary time”. She adds, “Naturally, we are tremendously proud to have been able to play a small part in the delivery and operation of this hospital. This is a time for the whole nation to pull together and do everything they can to protect our collective wellbeing.” The Nightingale Harrogate has been set up within the Harrogate Convention Center in the North Yorkshire town and provides 500 additional beds.
ID R&D, the award-winning biometric solutions provider offering AI-based voice, face and behavioral user authentication and anti-spoofing capabilities, announced that its ISO 30107-3 compliant passive facial liveness product, IDLive Face has been selected by Reconnect, a Public Benefit Company that is revolutionizing the criminal justice industry. The technology further facilitates Reconnect’s mission to deliver modern monitoring technology that is designed to reduce incarceration, recidivism, and addiction. Reconnect is transforming outdated court-ordered monitoring that utilizes phone-based systems and bulky unreliable ankle bracelets to track location, mandated treatment attendance, and curfew. Criminal justice system Reconnect replaces these systems, which restrict movement and make re-entry to society more challenging, with a cellphone app and discreet ankle monitor. The solution is easier to use and maintain, more humane, and significantly less expensive which removes a huge burden for defendants who often can’t afford the equipment leasing fees. On any given day, more than 155,000 people in the criminal justice system are under some form of electronic monitoring and with new initiatives to reduce inmate populations to curtail the spread of COVID-19 that number will rise. Reconnect enables supervised persons to check in with a selfie on a cellphone app that uses GPS technology, face recognition for biometric matching, and ID R&D’s passive facial liveness to quickly and frictionlessly verify the user’s identity and location. Active facial liveness solution Prior to selecting ID R&D, Reconnect was using an in-house developed active facial liveness solution The liveness check, which happens nearly instantly in the background, ensures the user is present and not spoofing the system with a photo or video. Prior to selecting ID R&D, Reconnect was using an in-house developed active facial liveness solution that required users to follow instructions including blinking. “Liveness is a critical part of the Reconnect solution, but it’s not a core competency for us. ID R&D’s best-in-class technology enabled us to improve accuracy and reduce fraud while eliminating the need for active participation by users, resulting in a faster experience and less confusion,” said Melih Onvural, VP Product at Reconnect. Frictionless user experience Reconnect is used by over 150 drug courts, probation, parole, and third party administrators across 31 states. The solution provides all the capabilities of traditional monitoring mechanisms without the cost, usability issues, or stigma and with features such as reminders designed to help people succeed and reduce recidivism. It also provides a single platform for the court to monitor their entire population of supervised participants. “We applaud Reconnect’s mission to deliver a more ethical and effective form of monitoring while allowing courts to manage participants with less manpower at a lower cost,” said John Amein, SVP of Sales at ID R&D. “This is an excellent example of ID R&D’s commitment to using the science of biometrics to deliver the ideal, frictionless user experience for authentication while also strengthening security.”
HID Global, a worldwide renowned company in trusted identity solutions, has announced that it has been selected by Jakarta-based service office provider, Werkspace Indonesia, to power its access control system, allowing several hundred users to access their co-working space conveniently and securely. Established in 2017, Werkspace is one of the fastest growing co-working space providers in Jakarta, and currently serves both startups and established businesses that need professional, reliable and secure working space. Secure access to working space Werkspace currently operates four offices in Jakarta, at SOHO Capital, Eiffel Tower PIK, Pluit and Kota Kasablanka. These four locations comprise 5,500 sq. meters of floor space in total, and include private offices, virtual offices, meeting rooms, dedicated desks, co-working hot desks and event areas. “Indonesia has a vibrant start-up sector, with the co-working business leading the charge. While a strong spirit of collaboration exists, secure access to the workspace is also an important consideration,” said Jessica Sa’ied, Werkspace Community Manager. Seos credential technology Seos credential technology allows us to quickly and easily grant or revoke building access for a new set of people" She adds, “By using HID Global’s access control system, we have been able to achieve this, allowing our clients to access Werkspace facilities conveniently and securely. Every day, we have a lot of clients and customers that come in and leave from the office, making a secure access system a very important criterion to Werkspace.” Jessica further said, “Thus, we require a robust, secured and trusted solution that is able to deliver this benefit. HID Global’s Seos credential technology allows us to quickly and easily grant or revoke building access for a new set of people on a regular basis. The system also provides insights on client traffic in our buildings, which is value information for our expansion plans and new centers in the future.” Seos smart cards Alex Tan Hoe Keat, Director of Sales, ASEAN, Physical Access Control, with HID Global stated, “HID’s Seos smart cards provide the ideal mix of security, mobility and flexibility for any organization. Powered by highly advanced encryption and a software-based infrastructure, it secures trusted identities on any form factor and can be extended for applications beyond physical access control." Alex adds, “It is ideal for co-working spaces like Werkspace that require high security and nimble ID management in cases where building access needs to be granted and revoked for a new set of people on a regular basis.”
Round table discussion
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload