As lockdown restrictions ease and public mobility increases, new research reveals three-quarters (75%) of people have health, safety, and security concerns when visiting their nearest city, signaling a need for new security innovations and greater public reassurance on their return to UK cities. Following high profile cases such as the disappearance of Sarah Everard, the London Bridge terror attack, and recent road cyclist deaths, the public has a heightened awareness of the safety and sec...
Invixium, a manufacturer of innovative touchless biometric solutions, has been selected by LightEdge Solutions as the standard for its access control solution. The system has been implemented in multiple LightEdge data centers in the Midwestern United States to manage access for hundreds of people including data center employees, tenants, and visitors at each location. Invixium IXM TITAN Before modernizing their access control, LightEdge had been using a hand geometry-based system t...
Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs’ Association's (NSA) annual conference and exhibition – NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition. NSA 2021 Annual Conference and Exhibition The annual conference is an opportunity for...
Developed by the British company Monitor Computer Systems (MCS), Sentinel is an alarm and video handling software application used by a significant number of Alarm Receiving Centers (ARC) in the UK. It is also adopted in many monitoring stations across Europe, North America, and Australia. Visual monitoring solution When OPTEX launched its Intelligent Visual Monitoring solution for monitored alarms systems, it engaged with MCS to ensure all the contact ID (alarm codes) generated on-site...
The smartphone is changing access control and security management at every scale and level, from global corporations to small companies. Making the switch to mobile access control, however, can seem daunting. Questions may arise around cost, practicality and the potential need for new door hardware. Yet going mobile is actually a lot simpler and quicker than many think, as one new guide explains. Data from the recent Wireless Access Control Report 2021 suggests almost two-thirds of organization...
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced they will be displaying contactless security doors and turnstiles, including a new optical turnstile, the Speedlane Compact, in booth #8037 at the ISC West exhibition in Las Vegas on July 19-21. ISC West is the largest security event in North America, bringing together thousands of security and safety professionals for networking, education, and discovery of new technology. All of...
With a length of only 127 mm and a diameter of 48 mm, these ultra-compact cameras complement the current product portfolio of explosion-proof cameras, and cannot only be installed easily but are also cost-effective – making SAMCON a full-stack supplier. Due to the easy integration into existing video management systems and the fact that cameras can be combined flexibly, Samcon's portfolio virtually covers all CCTV applications for hazardous areas. Whether an only 700g weighing thermal camera, a high-speed system with electronic zoom and focus lens, or a high-speed dome camera is required – Samcon offers secure surveillance for all applications and areas. Benefits of the ExCam ultra-compact systems The new camera line is suitable for temporary and semi-fixed applications, too. The waterproof IP68 housing is resistant to chemicals as well as to oil and can be installed in locations where larger equipment does not fit or an installation is difficult due to restricted space. Compact design with sensors The HDTV resolution and the high-performance varifocal lens master all surveillance tasks and create safe areas The ExCam IPP1275 can easily keep up with larger models regarding performance and resolution, even exceeding competitor models in certain functional areas. For example, the camera's progressive scan allows providing high-resolution pictures of moving objects without motion blur. The HDTV resolution (1920 x 1080) and the high-performance varifocal lens master all surveillance tasks and reliably create safe areas. The ExCam IPP1275 is a modularly designed ATEX network camera and consists of an ultra-compact sensor unit for image capturing as well as the main unit, processing the image. Integrated into the main unit are the network as well as power connection and a storage card slot. Thermal camera with night vision Apart from the ExCam IPP1275, Samcon also presents with the ExCam IPP1280 its first own thermal camera. Its most outstanding feature is that even in complete darkness, it can still deliver pictures so that no external light sources are necessary. Just as the ExCam IPP1275, also the ExCam IPP1280 consists of an ultra-compact sensor unit for capturing the thermal image as well as the main unit for processing it. Multi signal camera In addition to that, an analog AHD camera completes the portfolio: The ExCam miniTube is an analog multi-signal camera with very high light sensitivity in combination with an ultra-compact housing and a fixed focal length. This camera also is designed for applications in hazardous areas, meeting the requirements of guideline 14/34/EU ATEX and IECEx. Due to its ultra-compact size, it is particularly suitable for process observations. Just as all models of the ExCam Series, also the ultra-compact cameras have been certified according to the European (ATEX) and international guidelines (IECEx). Suitable for difficult to access areas The ExCam IPP1275 as well as the ExCam IPP1280 and the ExCam miniTube are real lightweights and so easy to handle that they can be installed by a single person. This is, for example, an advantage in the chemical industry or on oil rigs with confined spaces and not much freedom of movement. The easy power supply via PoE makes a separate power line superfluous and contributes, apart from the low weight, to an easy installation. Close to processes or mounted to very small sight glasses, not only the ExCam IPP1275 always finds its place, for example: At sight glasses located between pipe installations for monitoring the flow rate Small mixing containers (e.g. for colors or chemical substances) A small laboratory size reactors and freeze-driers and in compact industrial machines Enables surveillance and efficient monitoring They help to detect problems, can be used for surveilling machines and production runs The compact design and its low weight minimize vibrations and allow sufficient space to even place an additional light next to the camera. The cameras are of a rather inconspicuous design and allow, for example, reliable surveillance of plant filling stations, general plant areas, or vehicles such as tank and lift trucks or cranes. They help to detect problems, can be used for surveilling machines and production runs, and secure the functionality of components by monitoring them. Just like all other cameras of the ExCam Series, also the ultra-compact cameras are certified according to ATEX and IECEx to guarantee extensive explosion protection. The ex-protected housing covers ATEX groups II and can be used in zones 1, 2, 21, and 22 including the explosion groups IIC / IIIC.
Industry-renowned video surveillance outfit, Cloudview, has unveiled its latest state-of-the-art, cloud-based solution to the CCTV market. Buoyed by two successful funding rounds, Cloudview’s latest cloud video recording system (CVR) is now ready for launch. Cloud video recording system (CVR) This next-generation technology unifies, manages, and securely consolidates smart-triggered events from IP CCTV cameras in any location. Data is stored safely and is always accessible. Built from the ground up, the CVR utilizes British technology with military-grade data security and ‘privacy by design’ at its core. Cloudview’s CVR enables the capture, storage, and management of visual data, using the Cloud Cloudview’s CVR enables the capture, storage, and management of visual data, using the Cloud and securely consolidates visual data from any number of CCTV systems, into a unified, encrypted account, held on secure cloud servers and supported by Amazon Web Services. All data is hosted within the United Kingdom and Cloudview’s role-based access controls allow businesses to manage their visual data, so only users who require to see certain content are allowed to, helping businesses with their GDPR compliance. Compatible with IP-based cameras and system Compatible with virtually any IP-based camera and system, the cloud video recording system offers smart detection to maintain an active CCTV network and minimize system downtime. The Cloudview CVR can support business transformations from older analog systems into new IP-based networks. It also overhauls and can unify siloed parts of existing systems into a centrally managed CCTV system. Scalable storage options Optimized to work across any online or mobile network, Cloudview’s CVR offers scalable storage options that can support single camera to large-scale, multi-site operations. Recorded events are then accessible anywhere via the web. By ensuring the safety and security of assets and people, it allows clients to focus on their core business goals. Investor confidence in Cloudview comes hot on the heels of the new Chief Executive Officer (CEO) appointment for the company, Keith Cornell, who brings to the table, over 20 years of executive management, boardroom, and corporate development experience in the global technology market. His brief is to work with both investors and internal stakeholders to manage the company’s ambitious expansion plans. Enhancing people and asset safety The Cloudview CVR is key and represents the natural evolution of security technology" “The success of our recent funding rounds means we can now accelerate our activity to increase traction in the UK market,” said Cloudview’s Chief Executive Officer (CEO), Keith Cornell, adding “The Cloudview CVR is key and represents the natural evolution of security technology. Our central aim has not changed – to keep people and assets safe.” Keith Cornell adds, “Using the Cloud as the foundation means we can provide a system that delivers on that promise. CVR is flexible, easy, compatible and versatile enough for any security-conscious organization, no matter what their specific needs may be.” Future-proof platform He further stated, “With compliance and transparency baked into the system, our CVR solution offers a future-proof platform that will not only change the CCTV industry, but also set the benchmark for all future operations.” Cloudview’s CVR launch comes at a time of growing uptake in remote control and video surveillance, prompted by the ongoing COVID-19 pandemic. 81% of respondents in the 2020 IFSEC Video Surveillance Report believe that video technology plays an important safety role in tackling the problem. Facial recognition and CCTV have seen a 47% increase in use to track potential outbreaks.
Device Authority, a pioneer in identity and access management (IAM) for the Internet of Things (IoT), and Medigate, an IoT device security and asset management company dedicated to healthcare, announce their partnership for securing the Internet of Medical Things (IoMT). Whether to improve the cybersecurity of IoMT, or directly address other challenges, this partnership delivers Healthcare Delivery Organizations (HDOs) important new integrated capabilities. Explosive spending on the Internet of Medical Things (IoMT) is ushering in a healthcare revolution. And COVID-inspired advances to telehealth and remote patient monitoring (RPM) are compounding the trend. But connected medical progress comes with a price. Increased cyber risks IoMT devices and their ability to connect to Healthcare IT systems have also increased cyber risks IoMT devices and their ability to connect to Healthcare IT systems have also increased cyber risks. They must be effectively addressed, as cyberattacks do not just pose a threat to the financial business interests of the HDO but present potential patient safety risks. The Medigate platform fuses its understanding of clinical workflows with unmatched device profiling capabilities and knowledge of authorized operating requirements. This allows the company to instantly detect anomalous device behaviors and trigger appropriate remediation workflows. It also enables instant threat corelations to the HDO's potentially impacted assets. Device Authority’s KeyScaler™ platform uses patented Dynamic Device Key Generation (DDKG) and PKI Signature+ technology to address the identity access management challenges. KeyScaler is especially effective for medical devices, as it secures the medical devices’ identity and offers an automated approach for registration and authentication. Protecting sensitive data These measures protect sensitive patient data and other information exchanged among a wide range of devices – from smartphones to tablets, to large surgical robots or any other device that leverages standard digital certificate protocols. This partnership also opens the possibilities of retrofitting Device Authority's KeyScaler to legacy devices. This has the potential to deliver significant ROI, cost savings and help HDO's more rapidly comply with new and pending security guidance, directives, and regulations. Together we have a robust, secure end-to-end solution for healthcare providers" “We are delighted to partner and collaborate with Medigate who focus on the healthcare and medical industry which has always been a core focus for Device Authority. Together we have a robust, secure end-to-end solution for healthcare providers and medical device manufacturers solving detection, patient safety, compliance, and data security challenges,” said Darron Antill, CEO of Device Authority. Remaining clinically focused “The COVID-19 epidemic showed us the power of health IT, but it also reinforced how critically important it is to manage and protect the devices used to facilitate care– both inside and outside the four walls of the hospital. By integrating Medigate technology with Device Authority’s platform, we’re able to offer capabilities that are uniquely built to meet the NIST functions of Identify, Detect and Protect, while remaining clinically focused and attuned to medical workflows.” “We’re thrilled to partner with Device Authority and for the opportunity to leverage their best-in-class solutions to protect patients, clinicians, hospital leaders, and all others who utilize the IoMT on a daily basis,” said Stephan Goldberg, VP of Systems Engineering at Medigate.
D-Link, a global leader in security and surveillance technology, has unveiled the JustConnect 16-Channel H.265 PoE Network Video Recorder (DNR-4020-16P) – an all-in-on IP video surveillance solution that offers SMBs and enterprises a robust surveillance system. Extensive monitoring The all-in-one DNR-4020-16P comes with integrated PoE ports, which can power and connect up to 16 individual cameras and is specifically designed to provide extensive monitoring wherever needed. H.265/HEVC (High-Efficiency Video Coding) support reduces overall network bandwidth utilization and allows more videos to be stored without sacrificing image quality or resolution. Robust and automated surveillance Offering flexible, robust, and automated surveillance, the JustConnect 16-Channel H.265 PoE Network Video Recorder is designed with multiple recording modes including continuous, scheduled, and event-based recording. It also offers the option to back up videos to an external USB drive or alternative network storage The DNR-4020-16P comes with two integrated hard disk bays with a maximum capacity of 16TB, allowing video footage to be safely recorded and stored. It also offers the option to back up videos to an external USB drive or alternative network storage. Built-in Alarm In ports Due to its built-in Alarm In ports, motion or contact sensors can be connected to trigger recordings automatically. At the same time, Alarm Out ports provide the option to set up visual or audible warnings. With its built-in HDMI and VGA ports, and keyboard and mouse support, the DNR-4020-16P provides real-time monitoring and playback without the need for a separate computer or additional software. Friendly UI The user-friendly interface provides administrators with 16 channels of simultaneous live view, recording, playback, and PTZ control. For added flexibility, the free JustConnect+ cellphone app lets administrators monitor the system remotely on cellphone devices - such as a smartphone or tablet. IP66-rated with alert detection The DNS-4020-16P is fully compatible with D-Link’s latest Vigilance camera range, including 2/4/8 Megapixel Dome and Bullet cameras, all supporting H.265 with resolutions up to 4K Ultra HD. The dome and bullet cameras come with weatherproof IP66-rated housing, with the dome cameras further protected against vandalism with IK10-rated housing. Furthermore, it also works with mydlink™ cameras that support ONVIF Profile S and the Group Temperature Screening Camera (DCS-9500T), which can provide vital detection and alert in detecting people with elevated temperatures.
The Security Industry Association (SIA), as part of its Women in Security Forum initiative, will host a complimentary keynote event during ISC West, featuring remarks from two-time racing champion Julia Landauer, on risk analysis and working with fear, the importance of STEM education, women’s empowerment and leadership. ISC West 2021 ISC West 2021 will take place from July 19 to July 21, 2021, at the Sands Expo & Convention Center in Las Vegas, Nevada. The SIA Women in Security Forum Keynote at ISC West will be held on Wednesday, July 21, on the ISC West Keynote Stage at 8:30 a.m. The SIA Education@ISC West program recently revealed full conference details, highlighting 65+ sessions and over 115 confirmed speakers, in addition to this year’s Keynote Series Sessions featuring Julia Landauer, as well as Dave Komendat – Vice President and Chief Security Officer for Enterprise Operations, Finance and Sustainability, Enterprise Services at The Boeing Company and James Gagliano – retired FBI supervisory special agent, law enforcement analyst and adjunct assistant professor and doctoral candidate at St. John’s University. NASCAR racing veteran In her racing career, Julia Landauer has amassed dozens of wins in many different series In her racing career, Julia Landauer has amassed dozens of wins in many different series, since making history as the first and youngest female champion in the Skip Barber Racing Series, at an age of 14 years. She was the first woman to win a NASCAR Track Championship at Motor Mile Speedway in her division in 2015, became the first woman to lead a lap in the Canadian NASCAR Pinty’s Series and currently races in the NASCAR Euro Series. Featured in Forbes 30 Under 30 list In 2017, Julia Landauer was selected as an honoree for the Forbes 30 Under 30 list in the sports category and she was the only female member of the highly selective NASCAR Next class of 2016-2017. She supports the One Love Foundation, which educates about healthy versus unhealthy relationships, as well as the TechForce Foundation, which helps students find technical vocations, and is also part of the Global Shapers community, born out of the World Economic Forum. She holds a bachelor’s degree in science, technology and society from Stanford University. Women in Security Forum Keynote SIA invites all ISC West attendees to close out their show experience with the Women in Security Forum Keynote at ISC West 2021. In addition to hearing Landauer’s dynamic presentation, event attendees will enjoy top-tier networking with women in the security industry. To reserve a seat at the event, interested individuals can register on SIA’s official website. “Through the SIA Women in Security Forum, SIA brings together its members and industry stakeholders to foster the advancement of women in the security industry and cultivate a diverse security workforce,” said Don Erickson, SIA’s Chief Executive Officer (CEO). We look forward to welcoming Julia Landauer, an inspiring young female leader" Don Erickson adds, “We look forward to welcoming Julia Landauer, an inspiring young female leader and advocate in the areas of technology and community, to this special event to share her knowledge, experiences and insights with ISC West attendees.” SIA's Women in Security Forum SIA’s Women in Security Forum is a community that works to promote, recruit and cultivate the leadership of women for a more inclusive and diversified industry. In addition to organizing the ISC West Keynote event, the SIA Women in Security Forum offers a number of key programs and activities, including the SIA Progress Award, which celebrates individuals who advance opportunities for women in the security industry; the SIA Women in Security Forum Scholarship, which offers multiple awards worth at least US$ 3,000 each that SIA members and students can use toward professional development and education. Other SIA initiatives include volunteer efforts that give back to the community, a virtual education series, collaborative projects with other organizations that seek to empower women in the security and technology fields, sponsorship of the Women in Biometrics Awards, which recognize distinguished female leaders in the biometric identity and security industry, thought leadership and speaking opportunities, and engaging networking and professional growth events. Participation in the SIA Women in Security Forum is open to all SIA members and student members.
NCP (NCP engineering, Inc.), a globally renowned specialist for fully automated, secure data communication, has announced the release of the version 2.0 of the NCP VS GovNet Connector. This powerful software solution is approved by the Federal Office for Information Security (BSI) in Germany for processing data classified as for official use only (VS-NfD), RESTREINT UE/EU RESTRICTED and NATO RESTRICTED. NCP VS GovNet Connector 2.0 NCP VS GovNet Connector 2.0 provides a secure link between workstations processing sensitive data and remote systems. Users benefit from the wide range of features, which offer an advanced level of security, but remain easy to use. NCP has implemented a new integrity service in version 2.0, in order to meet the strict requirements of BSI approval. NCP VS GovNet Connector 2.0 is a purely software-based solution that can be easily deployed to workstations using standard tools and uses advanced encryption algorithms. The software is designed for use in government offices, public authorities, and companies that need to process classified or confidential data securely. It is used for securely processing and transmitting data that have been classified as for official use only (VS-NfD or equivalent). NCP Secure Enterprise Management (SEM) The software client ensures ease of use without requiring additional hardware The software client ensures ease of use without requiring additional hardware. Organizations can deploy, commission, update and manage clients conveniently via NCP Secure Enterprise Management (SEM), as a single point of administration. NCP offer flexible licensing models, such as ‘pay-per-use’ to cover individual customer requirements. “We are pleased that NCP VS GovNet Connector 2.0 has been officially approved by BSI for processing sensitive data classified as for official use only (VS-NfD), RESTREINT UE/EU RESTRICTED and NATO RESTRICTED. We have developed our product exclusively in Germany and we use the most advanced encryption algorithms, ensuring maximum security for sensitive data without compromising on ease of use,” stated NCP Managing Director, Patrick Oliver Graf, while promoting the added value of NCP’s VS GovNet Connector. Suitable for sensitive data processing Patrick adds, “Thanks to high scalability and flexible licensing models, we are in an ideal position to respond to our customers’ individual needs. Throughout the development process, we focused on developing a practical solution that is suitable for sensitive data processing in different organizations.” NCP has introduced a new integrity service in version 2.0, which enhances the security of NCP VS GovNet Connector. The VPN client now tests security-relevant functions when it starts and regularly during operation, including checking the authenticity and integrity of the VPN software and verifying the correct execution of cryptographic algorithms and random number generators. If these tests fail, the VPN client secures the workstation and blocks further communication. Meets all security standards NCP VS GovNet Connector 2.0 meets all security standards required by the BSI, while remaining easy to use for end-users. It is installed on devices with a standard Windows 10 operating system. After successful authentication, users can access all applications and resources from the central data network via LAN, Wi-Fi, or mobile data via Virtual Private Network (VPN). The client offers a maximum level of security and includes advanced features such as biometric authentication, VPN Path Finder Technology, and Quality of Service. Mandatory biometric authentication NCP VS GovNet Connector 2.0 provides biometric authentication before the VPN connection is established In addition to supporting certificates or smart cards in a PKI (Public Key Infrastructure), NCP VS GovNet Connector 2.0 provides biometric authentication, before the VPN connection is established, for example via fingerprint or facial recognition. The authentication process begins when users click connect in the connector UI, but the connection is not initiated until biometric authentication has been successfully completed. If the device does not have any hardware for biometric authentication or if this is not activated, the user may alternatively enter a password. Patented VPN Path Finder Technology NCP’s patented VPN Path Finder Technology also enables remote access even behind firewalls, which block IPsec traffic by switching to a modified IPsec protocol mode that uses the HTTPS port to establish a VPN tunnel. This offers the same security features as IPsec, which means that the VPN Path Finder protocol does not need to be re-evaluated for security reasons. The key advantage of VPN Path Finder Technology is that the administrator can reliably implement a security policy throughout the organization. Meanwhile, users continue to benefit from the same features and authentication methods as IPsec. Quality of Service The Quality of Service features reserves bandwidth for configured applications such as VoIP. Outgoing data from selected data sources on the end device can be prioritized in the VPN tunnel. For the user, this means stable VoIP communication through the VPN tunnel even with high data volumes.
With the continued rolling back of COVID restrictions in the UK, there is a palpable sense of relief. A mixture of mass vaccinations, widespread testing, and track and tracing of the infection is helping to enable a healthy bounce back for businesses – with secure access control taking an important role in facilitating this. However, rather than just being a reaction to the wake of the pandemic, there is every sign that the economy, and consequently the security sector as well, are both rebuilding and reshaping for the long-term new normal. Prioritizing Safety Already deemed an essential service even during the first wave of the pandemic, the security industry has of course taken a vital role in protecting people and property throughout the crisis. Now that venues in the UK are starting to reopen again, our services are key to occupancy management and ensuring that disease transmission is limited as far as possible. Access control is also key in reassuring people that their safety is a priority. Making the upgrade It’s all been about choosing the most suitable components and technology that already existed with a few “tweaks” Businesses and organizations have a duty of care to their employees and the safety of visitors – so controlling access, employing lateral flow testing, and deploying suitable Track & Trace mechanisms are all key components. I think those outside our industry are surprised to learn that most of the technology being deployed and used hasn’t just magically developed since COVID appeared – it’s all been about choosing the most suitable components and technology that already existed albeit with a few development “tweaks” or adjustments for the situation at hand. This includes using or installing facial recognition readers rather than using fingerprint or contact tokens, it is swapping to automatic request to exit sensors instead of buttons; it is using powered secure doors rather than having people all grab the same handle. Using cellphone credentials is also a key technology choice – why not use the highly secure, easy to manage, cost-effective, and of course contact-free benefits of this approach? Touchless solutions We have seen a clear shift in organizations looking to protect their staff and visitors. For instance, we have a big utility customer in Southeast Asia that has just replaced close to 200 sites using fingerprint readers with an additional facial recognition capability. We have also seen a big rise in demand for touchless request to exit sensors and Bluetooth Low Energy Readers for use with smartphone authentication. Working together Integration of security systems is of course nothing new, but in the post-pandemic or endemic age, it has perhaps never been more important. Installations need to be simple, straightforward, and rapid to help maintain safe distancing but also to ensure systems can be deployed as soon as they are needed. The world is changing and developing rapidly and there is simply no place for systems that don’t work with others or cause the end-user considerable cost and inconvenience to upgrade. This flexible delivery of security solutions perfectly matches the evolving and increasing demands of the market. It’s clear that end-users want systems that work well and can easily integrate with their existing systems – not only security but all the other business components which work in unison with each other over a shared network. Great opportunities ahead The recent work-from-home trend is also clearly changing the way organizations and businesses interact with the built environment. Lots of companies are downsizing, offices are being split up, there is lots of revitalization and reuse of existing office space – all of which creates considerable opportunities for security providers. UK inflation more than doubled in April 2021 with unemployment figures dropping and the Pound rising in value There are also, in the UK at least, clear signs that the construction industry is rapidly growing again -with a forecast of 8% rebound and growth this year. UK inflation more than doubled in April 2021 with unemployment figures dropping and the Pound rising in value – all positive signs for UK-based security providers. Undoubtedly the highly successful UK vaccination rollout has helped considerably, but there are signs that the Eurozone looks set to improve considerably over the next few months as well. Using integrated access control Undoubtedly the pandemic has made security markets around the world more aware of the benefits of integrated access control in managing the needs of the new normal COVID endemic environment. For example, as a business, we have always had keen interest from the UK healthcare sector, but over the last 12 months, we have seen a big growth in previously modest international markets including Morocco, Kuwait, Bahrain, Thailand, Singapore, Hong Kong, and Thailand – all of which are very keen to adopt improved access control solutions. Learning the lessons Nobody would deny the last year or so has been unprecedentedly tough on everyone, as a society we have had to make huge changes and sacrifices. Governments, organizations, and businesses all need to be better prepared in the future, to understand the things that went wrong and those that were successful. However, there is a world beyond the immediate pandemic and its effects. Flexible working practices and the changes these will have to the way we live and work will undoubtedly present great opportunities for the security sector in helping the world evolve. The pandemic has been a wake-up call for many organizations with regards to their duty of care to employees – particularly when it comes to mental health and providing a sensible work/life balance. Where we work and the safety of these facilities has received far more scrutiny than before. Flexible security systems Integrated security solutions have a vital role to play in not only protecting the safety of people during the post-lockdown return to work but also in the evolution of the built environment and move towards smart cities - which inevitably will now need to consider greater flexibility in securing home working spaces rather than just traditional places of work. Importantly, powerful access control and integrated security systems need to be flexible to the uncertainties ahead. The COVID pandemic has shown that nothing can be considered certain, except the need for greater flexibility and resilience in the way we operate our professional and personal interactions.
The global biometrics market has been recently developing rapidly, and this trend will continue shortly. If in 2018 its volume was estimated at $23.4 billion, according to the forecast of the analytical company BCC Research, the market size may increase to $71.6 billion with an average annual growth rate of 23.2 % by 2024. Fingerprint scanning, facial recognition, iris, vein, and voice technologies are expected to be implemented at the fastest pace. The analysis is based on the revenue indicators of key players depending on segments, including hardware, software, and integration. Biometric electronic documents Another analytical Agency, Acuity Research, estimates that the number of biometric electronic IDs will increase by about 3.5 billion electronic documents in the world. Moreover, more than half of the UN member States issue biometric passports. Government and private contracts of Canada, the United States, Belarus, Ukraine, Moldova, Lithuania, Hungary, Bangladesh, Senegal, and other countries are examples of implementation of programs for the transition to biometric electronic documents. Government organizations in various countries believe that biometrics is one of the most effective ways to identify refugees and those who cross the border. Now there are a lot of projects which are based on biometric technology. Biometric identification system Perhaps one of the most ambitious is the Aadhaar project being implemented in India Perhaps one of the most ambitious is the Aadhaar project being implemented in India. It is a biometric identification system that contains the data of more than a billion people. The database contains about 10 billion fingerprint templates, two billion iris templates, and a billion photos. There is another ambitious project at the Nairobi Jomo Kenyatta International Airport, where RecFaces company has implemented a passenger facial identification ready-made solution, that helps the security guards to receive notifications about airport visitors in just a few seconds and increase the efficiency of security services at least by 30%. The introduction of biometric identification of passengers aimed at increasing the level of airport security, as well as quickly obtaining information about the detection of wanted persons, stored in the long-term archive. Automated control gates As another example, face match is used at border checks to compare the portrait on a digitized biometric passport with the holder's face. In 2017, Thales company was responsible for supplying the new automated control gates for the system of Automated Fast Track Crossing at External Borders at Roissy Charles de Gaulle airport in Paris. This solution has been devised to facilitate evolution from fingerprint recognition to facial recognition This solution has been devised to facilitate evolution from fingerprint recognition to facial recognition during. Governmental systems, SmartCity, airports projects using identification technologies day by day become our reality and influence the growth of the biometrics market globally. Countries are studying the experience of each other and adopting it. Paperless payment technologies The global market of biometrics will shift all industries, starting from the transportation facilities especially airports, where a transition from traditional VMS and ACS to paperless biometric self-Boarding systems will be carried out. Sports facilities will see the development of paperless payment technologies at cash desks, and the banking sector — the payment systems with remote customer identification. HoReCa will transfer from staff time tracking systems to biometric payment systems, biometric check—in systems and the use of biometric identifiers. To sum up there are two most significant drivers of this growth are surveillance in the public sector and numerous other applications in diverse market segments.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.
For more than 22 years, Open Options, Addison, Texas, has developed access control solutions that connect to leading security technologies to deliver a full-scale solution based on each customer’s unique needs. In 2018, Open Options was acquired by ACRE, which already owned the Vanderbilt and ComNet brands. To find out the latest, we interviewed Chuck O’Leary, President of Open Options. Q: It has been two and a half years since Open Options was acquired by ACRE. Briefly describe that transition and how the company is stronger today because of it. O’Leary: The ACRE transition really focused on integrating our access control solution, DNA Fusion, with Vanderbilt Industries technologies in order to further our reach in the market and enhance our portfolios. With their support, we have been able to accelerate innovations and expand our global reach. Overall, it has been a great experience to be a part of the ACRE organization, and it has opened the doors to new opportunities for us both here in the states and globally. Q: What is "Connect Care" and how does it benefit integrators and/or end user customers? O’Leary: For those unfamiliar with the world of access control, it can often be a little overwhelming when first introduced; however, we strive to make our products as easy to use and intuitive as possible, with Connect Care being no different. Connect Care is a system that has been specifically designed to create the most connected experience in the security market Connect Care is a system that has been specifically designed to create the most connected experience in the security market. It serves as a 24/7 bridge from our customers to services like technical support, platform support, professional services, and training. By providing these options for our customers, we can better empower them with the knowledge and expertise of our DNA Fusion access control system and ensure their success with the product. Q: Who are the new customers entering the market for access control systems in the wake of the pandemic, and how should they be approached/managed differently? O’Leary: Over the last year, there has been a huge demand for access control systems as remote work increased due to COVID-19, and even now, as employees and students are heading back into the offices and schools. Organizations are realizing that having an outdated security system is no longer robust enough for the rapid advancement of technology that we witnessed over the course of the pandemic, and really the past few years. For those who are just dipping their toe into a new access control deployment, the most important thing they can do is to search for a provider who has a solution that is easily integrated, scalable, and provides excellent training and resources. Q: Define the term "touchless access control" and explain why it is gaining a higher profile in the post-pandemic world. O’Leary: The interesting thing about access control is that it has almost always been touchless. Many organizations are looking for robust solutions that are touchless and can be utilized remotely, and it's fairly easy to understand why a solution like this would become widely popular because of COVID-19. Integrators are searching for access control systems that will serve as a proper solution for organizationsThe process of using access control to streamline security infrastructures is not a new concept by any means, but due to the rapid development in technology over the past few years, more integrators are searching for access control systems that will serve as a proper solution for organizations, while still supplying the touchless and remote-based features. Q: What do you see as the future course of the changing technology trends we see in today's market (such as mobile credentials, cloud-based systems, cybersecurity, etc.)? O’Leary: As we continue to tread through the different technological developments in the market today, we are noticing that mobile credentials and biometrics are becoming increasingly popular. As cybersecurity and mobility continue to become more important, we are also seeing the rapid jump to the cloud. By utilizing cloud-based systems, an organization is not hindered by a lack of storage or old software and gains the flexibility to scale their security system as their business grows. Q: How will the access control market look different five years from now versus today? What about 10 years from now? O’Leary: Within the next five years, I suspect that access control will continue to make the move towards cloud-based systems and utilize mobile credentials and biometrics. In 10 years, I think all access control will be open platform and many more organizations will embrace cloud solutions for increased functionality. Also, innovations will continue to be the drivers behind new deployments with some installations being biometrics only and include recognizing fingerprints, retina scans, facial recognition, and voice. Q: What is the biggest challenge currently facing the access control market, and how should manufacturers (including Open Options) be addressing the challenge? O’Leary: One of the biggest challenges facing the physical access control market is organizations actually making the shift to more up-to-date access control systems. Organizations are looking to adopt more digital-focused access control experiencesOrganizations are looking to adopt more digital-focused access control experiences — ones that are focused on integration, newer features, cybersecurity, and ease of monitoring. Access control manufacturers should be addressing this challenge by creating integratable, scalable systems that are easily managed and provide a structured, streamlined approach for an organization’s security infrastructure. Q: What is the biggest misconception about access control? O’Leary: Access control is not a one-size-fits-all solution, and some organizations might have different standards or assets that need protection. This is why it's vital to know the risks your organization faces when speaking with access control providers — to ensure the best possible outcome for your specific needs. It's important to remember that whatever access control system is chosen should proactively mitigate any risks, be easily taught to and successfully used by employees, and be scalable with your organization. No matter the line of work, a proper access control system should streamline the security infrastructure and lessen stress on the security team and employees.
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalized within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full program of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalized within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognize how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximize effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilize. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
Invixium, a premier manufacturer of innovative touchless biometric solutions, has been chosen to provide PPG, a global pioneer in manufacturing paint and other specialty chemicals, an automated touchless solution to accurately measure employee temperatures at staff entry doors. When faced with the overwhelming cost of screening employee temperatures during the COVID-19 pandemic, PPG sought to invest in a solution that achieved high accuracy without breaking their budget. Need for integrated screening When the COVID-19 outbreak took hold in the United States in March of 2020, PPG took swift action by hiring additional security professionals to screen employee temperatures before entering their chemical plant. PPG hired multiple professionals to accommodate the thousands of employees that enter and exit the plant every day, costing PPG up to US$40,000 monthly just to manually screen employee temperatures before they gained access via a card-based turnstile system. Management at PPG saw a clear need: integrating automated temperature screening with their access control system would save them hundreds of thousands year over year. Automated temperature screening Integration of temperature screening with the access control system was key quality-of-life feature management wanted PPG reached out to Louisiana Radio Communications (LRC Wireless), a system integrator in the Southeast United States with expertise in chemical plant security. As the plant was already using OnGuard® by LenelS2 for access control, integration of temperature screening with the access control system was key quality-of-life feature management wanted. Enter Invixium Invixium is a manufacturer of healthy access solutions and an OAAP partner of LenelS2. LRC Wireless proposed IXM TITAN with Enhancement Kit to PPG for its automated functionality, integration with LenelS2 for access control, and because rapid automation keeps shift changes fast while saving nearly US$500,000 in staffing costs compared to manual temperature screening solutions. Protecting staff under budget “Businesses must accept that they need for healthy access is here to stay,” said Shiraz Kapadia, CEO & President at Invixium. “Leaders like PPG know it is their responsibility to assure staff that everyone around them is healthy and they are not at risk of illness. Our solution achieves this in a way that is fast and accurate while also minimizing security costs by automating the entire process. The results of this installation and cost savings are proof that automated health screening is the future of healthy access.” Modern solution “Invixium offers a portfolio of really impressive products. These are exciting, relevant solutions that LRC is proud to offer customers like PPG who need a modern solution to a problem we couldn’t even imagine having two years ago.” “Working with Invixium, LenelS2, and PPG’s in-house team, we were able to create a system that met every need PPG had,” said Jacob Brown, Sales Executive at LRC Wireless.
Harris County, Texas, the third most populous county in the U.S., is deploying a new, next-generation security system in its buildings that will help make them more efficient and easier to operate. The new Honeywell system replaces multiple, disparate systems by integrating access control, security cameras, alarms and monitoring across the county's nearly 150 buildings situated over 1,777 square miles in Houston and the surrounding areas. Streamlined security platform Texas-based security integrator, ESI Fire and Security Protection, worked with Harris County to identify its needs and implement a streamlined security platform, using Honeywell's Pro-Watch Intelligent Command security management system to network video recorders, video cameras, thermal readers, and thermal cameras. The new system provides detailed, real-time information about alarm events, access and safety across the county The new system provides detailed, real-time information about alarm events, access and safety across the county. “The security and well-being of the Harris County employees, visitors and residents is always a top priority.” said Retired Major Gen. Rick Noriega, Interim Executive Director, Harris County Universal Services. Pro-Watch Intelligent Command system Rick adds, “This project allowed us to improve our systems and gain better insights into the county's buildings to provide a safer environment. The solutions provided by Honeywell and ESI also better set the county up for the future – we can test and actively add technologies to address new needs with this flexible but scalable system.” Before Honeywell's Pro-Watch Intelligent Command system, each county building used different security products that didn't talk to one another, creating an overly complicated network and increased work for employees. Immediate benefits for Harris County will include: Saving taxpayer dollars through better analytics that reduce false alarms and help first responders. Monitoring from a single central control station for improved situational awareness. Creating healthier building environments by leveraging people-counting technologies and analytics to manage health and safety compliance, such as social distancing. Streamlining systems to create operational efficiencies and save the county resources that can be redirected to other critical infrastructure or services. IDEMIA biometrics solutions Harris County Universal Services is looking into deploying next-level biometrics solutions from IDEMIA to enhance access control at the courthouse. Using facial recognition, a camera mounted on the entrance turnstiles will recognize employees and frequent visitors, such as judges and lawyers, using data stored in the ProWatch system without the need to physically scan a badge or remove facial coverings. This frictionless access system will allow employees and visitors to enter the building in an efficient and secure manner. This system can also alert a precinct when a public park is reaching capacity and monitor building occupancy levels to comply with local health regulations. Harris County is actively testing and implementing new features that will add additional capabilities countywide. The upgrades are designed to proactively manage situations and respond faster when required. Enhancing intelligence and transparency Harris County lacked a holistic, real-time view into its various facilities with its previous systems" “Harris County lacked a holistic, real-time view into its various facilities with its previous systems,” said James Humbert, Business Development Manager at ESI Fire and Security Protection. James adds, “We've partnered with the county and Honeywell to create positive change in just about every way the county operates by improving intelligence and transparency, reducing response times and helping to save taxpayers' dollars. We look forward to continuing to work with Harris County and Honeywell in creating an efficient and safe environment for residents and employees that is ready for the future.” Fully customized solution “Through a collaborative effort with the county and ESI teams, we created a more efficient and safer environment for people who work and visit Harris County public buildings,” said Rick Koscinski, General Manager, North America, Honeywell Commercial Security. Rick adds, “With a county as large as Harris County, it was no surprise that they had multiple, disconnected systems put in place over the years which limited efficiency and connectedness. Now, the county has a fully customized solution that is built to evolve with its needs that will not only help increase safety and awareness but also create an improved building experience for its employees and building visitors.” With a population of nearly five million people, Harris County employs more than 15,000 workers to support its residents with services including public safety, jails, law enforcement, courts, library services, and licensing facilities. Harris County Universal Services Harris County Universal Services is the solutions center for the departments and offices of Harris County. It designs, implements, and maintains high-quality, innovative, and cost-effective technology products and services for its customers. It provides comprehensive support through eight consumer divisions: Business Applications, Business Operations, Customer Service, Cyber Security, Fleet Services, Information Technology Infrastructure, Program Delivery & Analytics, and Public Safety Technology.
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralized attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralized attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrolment of the worker credentials COSEC Contract Workers Management facilitates enrolment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customized reports. Smooth and effective monitoring of work orders. Improved security with centralized control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimized manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
Sensor solutions provider HENSOLDT has received an order from Krauss-Maffei Wegmann (KMW) worth nearly 75 million euros to equip the Royal Netherlands Army's ‘Fennek’ armored reconnaissance vehicles with visual systems. The scope of the order includes 188 BAA II NL observation and reconnaissance systems as well as a number of spare parts. “Our optronic solutions combine sensors from different technologies to provide armored vehicle crews with an excellent situational awareness,” said Andreas Hülle, CEO of HENSOLDT Optronics. “In the field, this capability is essential to fulfill the mission and ensure the protection of the crews.” Near-infrared cut filter The scope of the contract also includes adjustments to the YellowKite camera The BAA II NL is the logical further development of the BAA II JFST, which is already in use in the Joint Fire Support Team (JFST) of the German Armed Forces. The external dimensions have remained the same and the use and menu navigation has also been left unchanged in order to keep the training effort for the crew as low as possible. The scope of the contract also includes adjustments to the YellowKite camera, which will be optimized to become a day-vision/near-infrared (NIR) camera with color vision and will receive a near-infrared cut filter. In addition, HENSOLDT provides a digital outlet. HENSOLDT will deliver the observation and reconnaissance systems to Krauss-Maffei Wegmann (KMW), which will handle the integration of the BAA II NL and its command and control system into the Fennek reconnaissance vehicles. Deliveries to KMW will begin in autumn 2022 with the qualification systems. Series delivery will start in 2023 and is scheduled to be completed by 2027.
Sensor systems supplier HENSOLDT has been awarded a contract worth approximately 200 million euros in the frame of ‘Quadriga’ procurement program of 38 Eurofighter/Typhoon combat aircraft by the German Air Force. The contract placed by Airbus Defense and Space comprises the production and delivery of radar systems and core electronics components which will be produced at HENSOLDT’s site in Ulm and at consortium partner Indra’s site in Spain. Improving the aircraft’s survivability “The high pace of development in the field of electronics and, above all, digitalization constantly gives rise to new applications. With this contract, the Eurofighter will benefit in the future from a primary sensor that is technologically top class and will improve the aircraft’s survivability in even high-intensity conflicts,” said HENSOLDT CEO Thomas Müller. “The fact that the radar will be produced by a European consortium led by HENSOLDT, with Indra operating as the main partner, shows that there is good cooperation in Europe on joint armament programs.” AESA-based technology The new radar is based on state-of-the-art AESA (Active Electronically Scanned Array) technology. In contrast to conventional systems with a purely mechanically rotating antenna, the radar beam is electronically controlled by a multitude of individual transmit/receive modules. A highly sophisticated multichannel receiver allows several tasks to be performed at the same time This principle in combination with a highly sophisticated multichannel receiver allows several tasks to be performed at the same time, and no longer one after the other like previously, e.g. tracking individual targets while scanning a wide expanse of the airspace in front of the aircraft. AI-based sensors HENSOLDT was already involved in the development and production of the sensor systems currently used in Eurofighter aircraft. At present, the company has a workforce of 2,500 people at its main production site in Ulm and is planning to hire 300 new employees for the HENSOLDT Group this year. The sensor company is investing 30 million euros in the construction of a radio frequency technology development center in Ulm, among other things. In addition to electronic components for the new Eurofighter radar, AI-based sensors for a wide range of applications will also be developed there.
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimizing their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Round table discussion
In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.
Cloud-based Access Control And Occupancy Management To Safeguard WorkplacesDownload
Wireless Access Control eBookDownload
How Are AI And Analytics Changing Physical Security, And What Should We Expect Next?Download