The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
South Wales Police have confirmed their intention to use facial recognition technology – rolling the application out to 50 police officers for an initial three-month trial. This will enable them to take a snapshot and analyze it immediately to answer the pressing question, “Are you really the person we’re looking for?” This introduction comes at a time when the effectiveness of facial recognition technology is still being challenged in court. Despite the positive decisio...
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the conveni...
It seems like every day there is another school or public shooting incident in the US. It dominates the news and has become a point of stress and fear for many Americans. According to the US Department of Justice Federal Bureau of Investigation, in 2018 alone, there were 27 incidents across 16 states resulting in 213 casualties. There is a great deal the security industry can do to prevent such violent incidents and preserve life. Protection Layers In general, protection should be built in la...
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis access control system. Personal Identity Verification In a market that has been traditionally weighed down by limited solutions that are often proprietary, these new options offer non-proprietary, open-a...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasizing the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
Johnson Controls has updated its Tyco Software House C•CURE 9000 security and event management system with new tools to optimize its security operations. Enhancements include metatags, broadened search capabilities and enhancements in video association, along with adding an additional layer of security with Multi-Factor Authentication mobile integration. C•CURE 9000 v2.80 users now have the ability to add two-factor authentication without needing to upgrade readers. With this added layer of security, users are notified on their mobile phone the moment their badge is used on a two-factor configured door, and have the option to approve or deny the access request as a second form of authentication, which helps to mitigate lost or stolen cards. Robust and customizable search capabilities C•CURE 9000 v2.80 also focuses on enhanced search capabilities with an emphasis on video association strengthening our access-led unification. Smart Search allows users to easily search for object names, object types, and tagged locations throughout the system. In addition, metatags provide an easy way to add attributes to items, allowing for more robust and customizable search capabilities that greatly reduce configuration time. C•CURE Web was updated with a health diagnostics dashboard which provides a snapshot of how the system is performing Additionally, C•CURE 9000 v2.80 includes a variety of new views, including the Receptionist Portal, simplifying visitor management with a dedicated dashboard which allows untrained C•CURE 9000 users the ability to manage the entire visitor lifecycle within C•CURE Portal. C•CURE Web was updated with a health diagnostics dashboard which provides a snapshot of how the system is performing over the last seven days. Automatic device-To-Video mapping The new Security View performs automatic device-to-video mapping to view devices and associated video, live or recorded, closest to an alarm/incident from one intuitive screen thus saving on configuration time. This feature is available for all Tyco cameras including the Illustra product line, as well as all third-party video partners. “The addition of mobile multi-factor authentication, coupled with our security operations enhancements in how we tag, search, and associate video makes C•CURE 9000 more accessible, and data more manageable than ever before,” said Ashley Tousignant, Sr. product manager, Access Control. “We look forward to continuing to provide more secure, intuitive solutions through our own products, as well as through our trusted partners.”
Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that includes versatile single sign-on (SSO) and highly-scalable directory services, while also maintaining data and resource isolation. This allows global organizations the ability to automate IAM operations, simplify management and achieve their cloud-first objectives. PingCloud Private Tenant Enterprises need a dependable way for customers, employees and partners to sign-on to their services and applications Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications. However, this requires companies to support multiple standards, different authentication flows, a wide range of identity and service providers while operating and maintaining the solution. For this reason, PingCloud Private Tenant allows enterprises to automate the operation of their IAM solution, so IT staff can focus on innovation, in addition to providing a global authentication authority. PingCloud Private Tenant provides the following capabilities and benefits: Coud IAM: Practically limitless configuration options combined with a dedicated cloud environment means enterprises control their data and security while also automating IAM operations. Highly-configurable authentication and directory services: Regardless of where applications or resources reside, enterprises can leverage PingCloud Private Tenant’s extensibility for their diverse user populations and identity types. Simplified identity management and minimized costs: Moving IAM solutions from on-premises to the cloud can save companies significant IT operational costs. PingCloud Private Tenant provides the convenience of centralized configuration via self-service and concierge support options, allowing enterprises to save without compromising support for challenging and complex enterprise use cases. Architected for enterprise hybrid IT: PingCloud Private Tenant reaches every corner of an enterprise’s hybrid IT or multi-cloud environment without the need to install, update and manage separate on-premises proxies and agents. Automated operations to reduce complexity: IT teams are able to respond more quickly and easily to global demand for IAM services by reducing geographical deployment complexity and simplifying IAM operations. Multi-Tenant cloud solutions PingCloud Private Tenant expands on the range of deployment options that Ping provides to enterprise customers PingCloud Private Tenant allows them to create different environments for development, test and production as needed, with regional configuration options to comply with geographic or regulatory constraints. PingCloud Private Tenant expands upon the broad range of deployment options that Ping provides to its enterprise customers, spanning multi-tenant cloud solutions, private cloud solutions and on premises software. These solutions cover the range of enterprise deployment preferences and use cases, and can operate independently or work together seamlessly as needed to support complex hybrid IT environments. Hybrid IT environments “Enterprises increasingly straddle hybrid IT and multi-cloud environments, as they prioritize a high standard of security and customer experience,” says Loren Russon, vice president of product management, Ping Identity. “PingCloud Private Tenant is designed to simplify identity management while providing the ability to retain full control of data and security.”
Identiv, Inc. has announced that the company and Schreiner Group GmbH & Co. KG have entered into a multi-year agreement for the delivery of Identiv’s RFID Inlays for device-level authentication and anti-counterfeiting of one-time-use medical devices in hospitals. Identiv RFID portfolio Currently contracted to strengthen secure authentication in the Internet of Things (IoT) over the next three years, several million inlays from Identiv’s radio-frequency identification (RFID) portfolio will be connected to high-tech labels and attached to one-time-use medical devices in hospitals throughout Europe. Identiv’s RFID Inlays will provide contactless identification of the devices, optimizing processes during medical procedures (i.e., checking for compatibility between different types of equipment) and protecting patients’ health and safety from counterfeiting. Identiv’s RFID Inlays will provide contactless identification of the devices, optimising processes during medical procedures Device-level authentication “Identiv is proud that our highly secure RFID Inlays were the right fit for this project, strengthening our long-term partnership with Schreiner Group,” said Dr. Manfred Mueller, Identiv COO and General Manager Identity. “We see device-level authentication and anti-counterfeiting applications gaining further importance throughout the IoT, not just in the medical field. Customers looking to protect people and products are our priority at Identiv.” Meeting the highest industry standards in the challenging healthcare market, Identiv’s dry 32 x 15 mm RFID Inlays feature Infineon SRF55V02P chips, aiming to provide the best possible treatment for patients. Once the three-year contract has been fulfilled, there will be discussion to expand the business. Intelligent identity solutions “At Schreiner Group, it’s our mission to benefit our customers by delivering intelligent solutions that optimize processes and enhance product safety,” said Manfred Laschinger, Schreiner Group GmbH Head of Corporate Purchasing. “Our customers are challenging us to meet the highest standards in terms of quality, reliability, and service. And we are pleased to continue working with Identiv to deliver just this.” Identiv’s comprehensive RFID, NFC, and inlay transponder portfolio brings smart identities and security to the IoT. Identiv’s innovative high-frequency (HF) and ultra-high frequency (UHF) 13.56 MHz RFID Inlays are completely customizable, are available as dry or wet inlays, and come in various shapes and sizes. The inlays can feature multiple designs integrating various materials, chip technologies, and frequencies for metal and non-metal environments. Near field communication smart posters Identiv produces inlays using advanced flip-chip technology and state-of-the-art, high-volume die-bonding processes with integrated inline quality and process control to guarantee superior quality performance. In addition to healthcare and the IoT, Identiv’s RFID Inlay portfolio can benefit near field communication (NFC) smart posters and billboards, libraries, event and transportation ticketing, automotive and chemical industries, logistics and supply chain, asset management, pharmaceuticals, electronic games, event management, wearable technology, customer loyalty programs, and more.
Sargent and Greenleaf, Inc. (S&G), a global manufacturer of high-security locks and locking systems for safes, vaults and high-security cabinets, has appointed Mark LeMire to Chief Executive Officer. LeMire comes to Sargent and Greenleaf with over 25 years of experience in executive management, new product development and engineering. Most recently, LeMire held leadership positions at Loma Systems and Buehler, both divisions of Illinois Tool Works (ITW). As a Global Director of Marketing and Product Development for Buehler, he managed and led the product portfolio encompassing lifecycle management, innovation and new product development. As CEO, LeMire will provide strategic leadership and day-to-day operational management for Sargent and Greenleaf, guiding the company to exceed its business objectives. Security and communication expert Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation" “We are proud to welcome Mark to the S&G executive team,” said Paul Bridwell, Managing Director at OpenGate Capital, who is responsible for overseeing all North American investments for the firm. “With his extensive product development knowledge, Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation as a trustworthy and dependable manufacturer of high-quality, innovative products.” OpenGate Capital acquired S&G in June 2019 and the business joins the firm’s global portfolio of lower middle market businesses operating across North America and Europe. Asset security “I am excited to work with the S&G team to build upon the successful and respected legacy that those before me have built over the last 160-plus years,” states LeMire. “As technology evolves, S&G will continue to provide products that secure our customers’ most valuable assets, while building even stronger customer relationships.” LeMire graduated from Purdue University with a B.S in Mechanical Engineering Technology and received his M.B.A in Marketing from DePaul University in Chicago.
In business and at home, the smartphone is a remote control for our lives. It’s a calendar and a credit card. We book holidays and do our daily banking. With video calling technology, we can even be in two places at once (or make it seem that way). Could there be untapped potential in using mobile phones for access control, too? According to official EU data, by 2016 94% of European large businesses were issuing their workers with some sort of connected mobile device. We seem to use our smartphones for everything. Yet mobile phones are under utilized when it comes to building security and access management. Mobile access Evolving technologies now enable us to manage access rights via mobile phone apps Evolving technologies now enable us to manage access rights via mobile phone apps, open a door with a virtual key credential, and much more. An estimated 44 million mobile credentials will be downloaded by 2021, according to a recent IHS Markit forecast. Smartphones enable wireless access control: Convenience: Part of the reason Apple Pay, Instagram and many more mobile services succeed is for the simple reason, we like to carry less stuff. With secure credentials on your phone, there’s no more need for a fob, a plastic smart-card or anything similar. Security: A screen-lock adds an extra layer of PIN, swipe passcode or fingerprint security. With phones, multi-factor authentication is baked into the credential. And how quickly would you notice if a plastic key-card went missing? Nowhere near as fast as you’d spot your smart phone was gone. Flexibility: Security and facility managers can do things with virtual keys that are impossible with a plastic credential. They can issue, revoke or amend them instantly and from anywhere with secure cloud access via a mobile phone. However briefly a temporary visitor needs to enter your building, the easiest way to let them in is with their phone. Efficiency: Scrap the queues at reception waiting for temporary visitor permits, waste fewer hours in plastic key-card handover meetings and spend less of your budget replacing lost and damaged credentials. Phone-based access control saves businesses time and money. Compatibility: Mobile phones are machines built for connectivity, including with your existing RFID locks. Bluetooth and NFC radio technology are already inside most modern smartphones. Every future viable wireless and contactless technology will be there, too. Another recent analyst report suggested as many as 20% of organizations would use smartphones for access, in place of plastic smart-cards, by 2020. The move to mobile access control seems inevitable. “Other highly security-aware industries like banking demonstrate the advantages of the smartphone,” says Thomas Schulz, Director Marketing & Communications Digital and Access Solutions at ASSA ABLOY EMEA. “Similarly, we see fast-growing interest in unlocking doors and other openings with mobile credentials, and in facility managers administering access rights via their smartphone.” SMARTair Openow solution “To take one example from our portfolio of mobile access solutions, security managers using our new SMARTair Openow solution manage all users’ virtual keys inside a secure app. If an administrator cancels a virtual key, it vanishes immediately from a user’s Openow app.” Schulz points to the new Arkansas State University campus in Mexico, where students and staff have no access cards to collect or validate. Every site user installs and validates their own Openow app and collects keys virtually. Wireless access control Smartphones add convenience and functionality right across our wireless access control product" “Smartphones add convenience and functionality right across our wireless access control product and solutions portfolio,” said Schulz. “Users can unlock our Aperio wireless locks with a Seos mobile credential. Small and medium-sized business managers can run their own access control with no specialist knowledge, using just the CLIQ Go app and their phone.” He further adds, “For companies with a remote workforce, the CLIQ Connect app updates access rights of programmable keys with just a secure Bluetooth connection. Access control from your mobile phone offers so many efficiency advantages. I’d encourage everyone involved in managing access control to take a look.”
Ping Identity, the provider of Identity Defined Security, announces updates to its multi-factor authentication (MFA) solution, PingID, providing new methods to mitigate risk and strengthen security for enterprises. PingID’s new features include ways to evaluate user and device risk before access is granted, as well as support for Fast Identity Online (FIDO) standards to increase resistance to advanced phishing attacks. With phishing resistant and user-friendly authentication methods—including biometric authenticators, such as facial recognition and fingerprint matching—enterprises are able to create policies to enforce MFA only when warranted by an increased level of risk. Risk-Based security Risk-based security is especially critical to maintain employee productivity Verizon’s 2019 Data Breach Investigations Report found that 32% of breaches involved phishing and 29% of breaches involved the use of stolen credentials. For this reason, enterprises can benefit from an MFA solution that evaluates user and device risk to provide an extra layer of protection against phished and stolen credentials. Risk-based security is especially critical to maintain employee productivity and seamless online customer experiences. As a result, MFA has become more highly recommended by security frameworks like Zero Trust, those promoted by the National Institute of Standards and Technology and the International Organization for Standardization, as well as regulations like the PCI Data Security Standard. Leveraging facial recognition PingID further improves the balance of security and convenience provided to end users through multi-factor authentication as follows: Generally available in the next month, PingID support for Windows Hello and Mac Touch ID will support FIDO-compliant authentication methods. This will help users leveraging facial recognition and fingerprint matching on their devices. These capabilities help to securely access web applications that have implemented the FIDO standard. Additionally, PingID integration with FIDO-compliant security keys, such as Yubikeys, can be leveraged for web authentication and Windows login. Becoming generally available in the same time period, hardware OATH compliant tokens will be able to be used as an authentication factor when users are unable to use a mobile device. Virtual private network PingID will have the ability to support a quick and easy way to implement MFA PingID can now configure the number of attempts consumers logging in to a provider’s website have to enter a one-time passcode (delivered by SMS or Email), as well as set the amount of time they are locked out of their accounts if failing to provide the right one-time passcode. Additionally, generally available in the next month, PingID will have the ability to support a quick and easy way to implement MFA for Virtual Private Network access when users are working remotely, simplifying deployment of MFA for enterprise administrators. Corporate Resources PingID is now offering features in private preview that evaluate the location where a user requests access to corporate resources, and compares it to the location of the previous request. If the distance between the two geographies exceeds the threshold of what is possible by human travel, access can be automatically denied. Also in private preview, PingID assesses the reputation of the IP address from which a user requests access. Organizations can mandate specific MFA methods when the malicious activity-based risk score associated with an IP address exceeds a certain benchmark. Multi-Factor authentication Hackers are evolving their tactics to access accounts and steal data every single day" “Hackers are evolving their tactics to access accounts and steal data every single day, and it’s our responsibility as an enterprise security provider to come up with innovative and reliable ways to assess risk before access is granted, and block access when warranted,” said Steve Shoaff, chief product officer, Ping Identity. “PingID is a core product that enterprises have been using for years, and its new features make it stronger and smarter than ever.” Organizations interested in securing their enterprise with multi-factor authentication can sign up for a free trial of PingID. Also, be sure to check out the blog titled ‘Five Preventable Breaches Make the Case for MFA Everywhere’ to learn more about attacks that can be prevented with multi-factor authentication.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business Access Controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labor and materials. Today we will look at four focus points: Vertical Markets, Cloud-Based Access Control, Technology Upgrades, and Preventative Maintenance and Service Agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical Markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective salesHaving logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-Based Access Control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology Upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive Maintenance And Service Agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labor 24/7” or a “parts and labor M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical Area Access Management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labor only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organizers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favorite soccer team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defense & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritized, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a soccer game. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organizers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organizers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same soccer team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million people across the 50 states,” Mr. Li says. “The math just doesn’t work, which is why our country pays $1+ trillion in negative economic impact annually – a hidden tax we all pay in blood, tears and treasure.” Robots provide professionals with new tools. “We make really smart eyes and ears that operate 24/7/365 for an affordable price,” says Mr. Li. “We have actually operated more than 700,000 hours in the real world, both outdoors and indoors, across 15 states and are now operating across five time zones – fully autonomous without any human intervention.” Utilizing Robotics And AI AI helps Knightscope robots interact better with humans and perform activities like identifying peopleKnightscope is a security technology company that utilizes self-driving technology, robotics and artificial intelligence to provide security professionals additional eyes and ears to do their jobs much more effectively – as well as provide a consistent around-the-clock physical deterrence to help minimize negative behavior. Knightscope says its K1, K3 and K5 security robots, and accompanying user interface, the Knightscope Security Operations Center (KSOC), continue to make significant contributions to the safety of its client base. Artificial intelligence helps Knightscope robots interact better with humans and perform activities like identifying people, looking up license plates, detecting rogue wireless devices, having a machine-to-human dialog and, in the future, detecting dangerous objects in a scene automatically. “Our long-term plan is to have the machines be able to see, feel, hear and smell, so advances in sensor capabilities, efforts in sensor fusion, and the future with 5G capabilities will make for profound advances,” says Mr. Li. Facial Recognition Software At ISC West 2019 was Knightscope’s fourth time exhibiting at ISC West, and they have also exhibited at GSX/ASIS, ISC East, numerous other trade shows, and have hosted some of their own. Mr. Li has seen the reaction to security robots evolve over the years. People are realizing that the technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs “At first, it was typically ‘what is that?’ or ‘what does it do?’ But the last 12 to 18 months have been very different. There has been much more meaningful, implementation-focused dialog, feedback, requests for new features, etc. Now folks are realizing that our technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs.” Their ISC West presence this year highlighted facial recognition software that utilizes deep learning to detect, analyze and compare faces. Pechanga Resort Casino in Temecula, Calif., an existing Knightscope customer, is using the beta format on its K1 security robot platform. Additional Benefits Of Using Robots Knightscope has raised over $40 million to develop and deploy its technology and is backed by more than 6,000 family offices, accelerators, funds, private investors and four major corporations, says Mr. Li. As the machines get smarter and more capable over time – the number of applications will become endless" Robots also provide additional benefits beyond security, says Mr. Li, such as branding, community relations and public relations opportunities for clients. “In some cases, our clients have utilized our Concierge feature to allow for human-to-machine customer service interactions,” he says. “We have also been able to showcase and inspire STEM (science, technology, engineering and math) students with practical applications of technology for the good of society. And robot selfies have certainly become a thing.” Endless Number Of Applications In terms of vertical markets, in the near term, Knightscope has seen positive scaling and growth on corporate campuses and at logistics facilities, manufacturing plants, hospitals, casinos, commercial real estate and malls. “As the machines get smarter and more capable over time – the number of applications will become endless,” says Mr. Li. They currently drop new software code every two weeks and new hardware typically a couple of times a year. “In my opinion, it is ill advised for early stage technology companies to utilize B2G (business-to-government) sales as the initial go-to-market strategy,” says Mr. Li. “For Knightscope we have been primarily focused on B2B (business-to-business) sales and actually until 2017 were geographically constrained to California only. What we are doing is technologically extremely difficult as these are effectively self-driving cars. Additionally, despite the never-ending international interest, we are laser focused on the United States.”
Allegion, globally renowned provider of security products and solutions, has announced that the Schlage AD electronic locks, NDE networked wireless locks, LE networked wireless locks and MT multi-technology readers now support contactless student IDs in Apple Wallet. Allegion - CBORD collaboration Allegion worked with CBORD and Apple to enable a mobile credential leveraging the industry global standard NXP DESFire EV1 security technology to provide higher education campuses with an easy-to-implement solution for the enablement of contactless student IDs for iPhone and Apple Watch. The University of Tennessee, University of Vermont and University of San Francisco are among the first schools to leverage the solution. “A recent study from The Center for Generational Kinetics found that 95 percent of Gen Z owns a smartphone and being connected is their norm. Because of this, universities are tasked with meeting student preferences while also ensuring campus security,” said Jeff Koziol, Allegion business development manager, campus software partner. “Allegion is proud to expand its product features to provide higher education campuses seamless yet flexible security solutions, and an improved mobile access experience for students and faculty members alike.” Contactless student IDs Having contactless student IDs in Apple Wallet makes it easier and more convenient for students and faculty to access buildings like residence halls or the library, as well as make payments on and around campus for coffee, laundry and other purchases with iPhone and Apple Watch. Universities can remotely issue credentials over-the-air, and those credentials are protected by two-factor authentication and can be remotely deactivated by the student or university. MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard "As an institution that values innovation, it's important to us that we are always adapting to the way students use technology to enhance the campus experience," said Chris Cimino, senior vice chancellor for finance and administration. "Being able to access your VolCard on your iPhone is one of the many ways UT is continuously improving to meet expectations for a modern campus.” MIFARE DESFire EV1 technology MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard and one of the top solutions in contactless credentials. By leveraging Allegion and CBORD’s solution with DESFire, higher education campuses are now able to take advantage of an open architecture and work with various manufacturers without being locked into a siloed proprietary solution. This new capability is compatible with the following Schlage commercial solutions: AD electronic locks - Schlage AD-400 wireless locks were designed to reduce installation costs on interior access-controlled doors, such as student rooms, faculty offices, classrooms and lab spaces, while offering the adaptability to support future evolutions in technology. The AD-400 and AD-300 wired locks are available in cylindrical, mortise, mortise deadbolt and exit trim chassis options, and they integrate into popular physical electronic access control systems (PACS). NDE networked wireless cylindrical locks - NDE wireless locks integrate into popular electronic access control systems from PACS providers to bring the benefits of electronic access control deeper into university buildings. NDE packages the cylindrical lock, credential reader and access control sensors together in to a small footprint that is both easy to install on university campuses and affordable. LE networked wireless mortise locks - The LE design packages the mortise lock, credential reader and access control sensors together into a small footprint that is both elegant and affordable. They feature two sleek trim options with broad range of decorative lever choices to match the style of any residence hall. MT Multi-Technology readers - Schlage MT multi-technology readers are designed to simplify university access control solutions and allow a transition from proximity or magnetic stripe (on a physical student ID) to more secure, encrypted smart card technology or mobile credentials in the Apple Wallet. Schlage’s AD Series Locks This extended offering is the next wave in Allegion’s pursuit to work with other providers in the industry for digital credential rollout in universities. Recently, the company announced its collaboration with Transact to enable contactless student IDs in Apple Wallet through Schlage’s AD Series Locks at Mercer University.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 meters using the latest UHF technology. With consistent reading up to 5 meters and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive widescreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives When the uPASS Reach reader is installed (maximum height two meters) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 meters as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 meters when installed inside non metallized windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallized, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environmentsThe Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 meters with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
HID Global, globally renowned trusted identity solutions provider, has announced support for Seos-enabled student IDs in Apple Wallet. Beginning this fall, students, faculty and staff at Clemson University will be able to add their IDs to Apple Wallet and use their iPhone and Apple Watch to access buildings on campus, purchase meals and much more. Seos-enabled student IDs “HID Global is excited to play an important role in creating transformative connected university experiences that make it easy for students to simply use their iPhone or Apple Watch to enjoy all that daily campus life has to offer,” said Stefan Widing, President and CEO with HID Global. HID’s technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students" Stefan adds, “HID’s broad range of technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students, faculty and staff take full advantage of convenient mobility applications. This fall, their Apple devices can be used for everything from entering buildings – such as residence halls and individual rooms – to buying meals, accessing the gym, and using secure print services and numerous other university resources.” iCLASS SE reader modules To support student IDs in Apple Wallet on iPhone and Apple Watch, HID provides Seos-enabled credentials, HID iCLASS SE and HID OMNIKEY readers, embedded HID iCLASS SE reader modules, and Corbin Russwin and SARGENT electronic locks from ASSA ABLOY. Through HID’s support of student IDs in Apple Wallet, Clemson students will be able to seamlessly access residence halls, libraries and fitness centers, buy lunch, make purchases at the university store, print documents and more by placing their iPhone or Apple Watch near a reader where contactless student ID cards are accepted. Contactless student IDs Contactless student IDs are supported on iPhone 6 and later and iPhone SE. On iPhone XS, iPhone XS Max, and iPhone XR, student IDs may still be used for up to five hours in power reserve mode when the iPhone battery needs to be charged. Student IDs in Apple Wallet are not only convenient, they also provide an extra level of security as students no longer have to worry about misplacing their physical card. School credential provisioning is protected by two factor authentication.
Health services and their funding have long been in the news, with social care and mental health coming in for particular attention. Both of these core areas are seeing a growing need for their services. While nationally this is a problem, there is good news in East Anglia with the opening of the 16 bedroom Samphire Ward at Chatterton House, a new acute care mental health facility in King’s Lynn, Norfolk. The build comprised of a refurbishment of two redundant wards linked to create one modern compliant 16 bed facility at a cost of £4m which is operated by North and West Norfolk Care Group, part of Norfolk and Suffolk NHS Foundation Trust (NSFT). NSFT provides inpatient and community-based mental health services in both Norfolk and Suffolk. It is also commissioned to provide in some of its localities, learning disability services, along with other specialist services including medium and low secure services and wellbeing. Continuim access control system Many of these sites use a legacy building access control system called Continuim The new facility is one of many sites across Norfolk and Suffolk that fall under management of the trust. Managing over 4,000 staff and controlling over 1500 access controlled doors across multiple sites. Many of these sites use a legacy building access control system called Continuim which is a bolt on module to Trend BMS, where all doors on this system are required to be wired on-line. Several years ago the trust wanted a more modern contactless access control solution for their facilities in Norfolk and Suffolk. They specifically wanted a solution that offered cost savings by not having to wire all doors. SALTO access control was chosen for fitting to new and refurbishment projects, with a view to possibly retro-fitting the new solution across all the existing sites on a rolling upgrade basis as time and future budgets allow. SALTO access control solution Security and Infrastructure Manager for the Strategic Estates department at the trust, Paul Evans, says “By choosing SALTO the trust were able to specify a mix of online and offline equipment. The cost saving for offline equipment enables the trust to specify more internal offline doors to become controllable as part of the access control system, thus giving us greater flexibility and security for our facilities.” Evans continues “Given the nature of our work and that some of our service users can have really challenging behavior issues, it is vital that for their safety and that of the staff, we are able to control access simply and easily yet securely into and around the many different areas of the ward, the administration area and indeed the rest of the rooms in the building.” Contactless smart access control Reduced-ligature hardware working with contactless smart access control was needed in the user areas A standard off-the-shelf access control solution was not suitable as reduced-ligature hardware working with contactless smart access control was needed in the user areas together with anti-barricade doors, vision panels, automatic lockdown abilities, locker locks and a host of other special items and so we wanted a company with specialist experience in this field to carry out the supply and installation.” After going out to a competitive open tending process, local security specialist and certificated SALTO partner AC Leigh, based in Norwich, won the contract to secure the new facility. One of their lead designers, Simon Clarkson, worked with Paul and his team to design and deliver the system. Central monitoring system Clarkson, Health and Safety Director at AC Leigh says “We listened to what Paul and his team needed and especially how they wanted to manage and control the building and delivered a completely focused solution that allows central administration of the facility using hardware and software from SALTO Systems as the core of the solution.” On-line wall readers are used to control access into and around the building and these have been installed on main entry points, alongside bedroom doors and in ‘airlocks’ to control access from one area to another. SALTO slave control units Paul Evans says, “The latest SALTO online CU4200 control units were used on this project where data can be shared to SALTO slave control units via a single master control unit. This reduced the load on the already exhausted IT infrastructure which has meant that more online doors can be added to the SALTO system.” Bedroom doors are all fail secure with mechanical key override and are also anti-barricade. The facility has the bespoke ability to operate a standard 8 male, 8 female bedroom configurations. However, the trust wanted the flexibility to extend either male or female bedrooms to 10 bedrooms. This was achieved by two swing corridor doors. Electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks. In their swing scenario a key switch can be operated which releases the hold open magnet and energizes the SALTO system powering a separate electronic locking device on the door. This enables the trust to easily maintain the required gender separation within the bedroom areas. Paul Evans comments “AC Leigh were able to configure the required solution easily and train the staff in its operation accordingly.” Aelement Fusion smart locks Other doors are fitted with Aelement Fusion smart locks. AC Leigh worked closely with the trust to design and manufacture special reduced ligature handles and reader covers to ensure that ligature points were reduced in conjunction with DHF technical specification TS001:2013 enhanced requirements and test methods for anti-ligature hardware. “The consultation between AC Leigh and the trust took several months with multiple prototypes being presented to the trust for approval.”, Evans says, adding “After looking at all the various options, the trust is happy that the best solution for this type of battery operated offline door has been chosen and installed at Chatterton house.” He also confirms that the bespoke design would be used as their preferred solution on future projects for this type of door. XS4 Mini locks Meanwhile in staff areas XS4 Mini locks are fitted. In open common areas, lockers are equipped with smart XS4 locker locks enabling each service user to have a secure storage place for their individual personal items. To operate the various doors, staff use their smartcard ID badges to gain access while service users use wristbands to access their bedroom, locker and certain permissible doors. SALTO SPACE electronic locking Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform that enables operators to effectively manage every door and user access plan on-site via powerful web-based access control management software. Audit trail information from the doors is held for 31 days before deletion in accordance with the trust data policy. Simon Clarkson concludes “The client needed precise tailoring of access levels and the SALTO access control solution has empowered them with an intuitive, easy to use but adaptive system. The use of this standalone largely battery operated access control system will provide significant cost savings over the years to come compared with other systems, and will deliver a reduction in engineer call-outs and simplify system administration making for a long term secure and reliable access control solution for the trust.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorized intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimizes future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
Ping Identity, the provider of Identity Defined Security, announced that Bentley Systems, a software development company, has selected the Ping Intelligent IdentityTM platform to advance the priority it has placed on driving exceptional user experiences. Bentley Systems selected Ping Identity to help strengthen Bentley’s ability to bring applications to market faster and build a flexible data model to support various current and future compliance requirements. Ping stood out as the market leader of choice because of its strict adherence to standards, which is critical in supporting Bentley Systems’ aim towards providing an increasingly open and extensible technology offering. Deploying Ping Identity solutions Bentley Systems will leverage PingFederate for secure authentication and standards-based single sign-on for usersAs part of its ‘going digital’ initiative, Bentley Systems will deploy PingFederate, PingAccess, PingDataGovernance and PingDirectory in order to offer more flexibility in the solutions that support its global business. Bentley Systems will leverage PingFederate for secure authentication and standards-based single sign-on (SSO) for Bentley users. The addition of PingAccess will enable centralized authorization as well as architectural flexibility to meet the access needs of Bentley's users around the world. With PingDataGovernance, the organization will enforce fine-grained access controls for identity data and APIs, while PingDirectory will store and secure identity data at scale. Flexible solutions to support business and users “From our first interaction with Ping Identity, it’s been clear to us that the organization is dedicated to our successful deployment and is a true technology partner,” said Lori Hufford, vice president of Digital Foundations, at Bentley Systems. “As a global company, having flexibility in the solutions that support our business and user base is essential. Ping offers that flexibility, while also providing standards leadership to help advance our user experience and digital priorities.”
Round table discussion
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?