Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration...
Alcatraz, developer of secure frictionless access control platforms, has named Debraj Sinha as Product Marketing Manager - an important role as the physical security technology startup brings its innovative Rock facial authentication product to market. Based in Silicon Valley, Sinha oversees all marketing efforts related to Alcatraz and its core hardware and software solutions including product launch and go-to-market strategy. His current focus at Alcatraz is to execute marketing campaigns, de...
Boon Edam Inc., a global provider in security entrances and architectural revolving doors, announces the 40th anniversary of the launch of the company’s renowned Tourlock security revolving door. The demand for this reliable security entrance, first built in 1980, continues to grow as the risks to organizations due to unauthorized entry increase. The Tourlock is used in thousands of facilities worldwide including commercial campuses and government buildings due to its high level of throug...
StoneLock, a pioneer in designing and manufacturing contactless and privacy-hardened biometrics solutions, announces Yanik Brunet as the company’s new General Manager. Bringing three decades of experience transforming technology companies into industry pioneers and innovators, Brunet will lead StoneLock's expansion while driving company culture and vision as the company prepares to launch a new product recently. Emerging new technologies “Yanik has been at the highest levels of en...
LenelS2 and FLIR Systems, Inc. announces that they had signed an agreement to integrate select FLIR thermal cameras with LenelS2’s OnGuard® access control system. The integrated, non-contact solution joins the Carrier Healthy Buildings Program suite of offerings to support reopening and to assist in slowing the spread of COVID-19 and possibly other viruses in the workplace through thermal screening. FLIR is a pioneer company specializing in the design and production of thermal imaging...
As part of the German Army's "qualified air defense" drone defense program, sensor specialist HENSOLDT is supplying the latest version of its "Spexer 2000 3D" radar to system integrator Kongsberg Defence & Aerospace. Spexer will be part of the C-UAS system (Counter-Unmanned Aerial System), which is based on Kongsberg's remote-controlled "Protector" weapon station, both mounted on an armored GTK "Boxer" vehicle. Initially 10 systems are under contract. Radar deliveries will start at the end...
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces the release of a recorded webinar, ‘The New Lobby Experience: Creating Safer Entrances for All People,’ co-hosted with Guidepost Solutions, LLC, a global firm offering security and technology consulting solutions. A panel of experts discuss the impact of COVID-19 and pandemics, for the near and long term, on lobby design, the challenges of maintaining security amid new requirements for social distancing and creating a touchless experience inside and around facilities. Security entrance solutions The webinar begins with a topic that has been of importance even before the spread of COVID-19: controlling access at the entry. Tailgating at swinging doors is one of the most common physical security breaches, and it can have devastating consequences. JC Powell and Robert Helena from Boon Edam touch on the results of a recent survey around the perceptions of security professionals on the impacts of tailgating before discussing how different security entrance solutions are used to deter, detect, or prevent tailgating incidents. Nick Miller from Guidepost Solutions discusses elements of design that must be considered in the ‘new lobby' Next, Nick Miller from Guidepost Solutions discusses elements of design that must be considered in the ‘new lobby.’ These include building population assessments, creating separate entry points by role (employees, visitors, vendors and package deliveries), and supporting and reinforcing distancing through the use of queuing space, furniture layout and other elements. Contactless biometric devices The webinar continues with a conversation between Boon Edam and Guidepost Solutions around new and existing technologies, and how they fit into the new lobby design. Some examples include: Entrance configurations: Arranging and adjustment of optical turnstiles to maintain social distancing. Temperature screening: How does the technology integrate with entrance solutions and how are ‘positives’ processed? Touchless entry technologies: Hands-free, automatic security entrances, automated elevator dispatch systems and contactless biometric devices. The webinar concludes with details surrounding on-site and virtual entry evaluations. These evaluations help security professionals identify unsecure entry points around a building or campus and the potential solutions available depending on the organization’s security strategy around tailgating. The evaluation also covers compliance considerations and integration with existing security systems.
HID Global, a worldwide provider of trusted identity solutions, announced the expansion of its biometrics identification management solutions to police departments and military installations around the globe. A large police force that covers a major capital city in Europe is using its HID NOMAD 30 Pocket Reader for rapid suspect identification in the field. Initially launched for Android platforms, the solution’s SDK is now available for iOS devices. This extends Bring-Your-Own-Device (BYOD) benefits to a wider scope of clients who seek a truly flexible and cellphone single-fingerprint verification solution. cellphone biometric solutions “The expansion of our offering to include iOS platforms broadens the adaptability and application of our cellphone biometric solutions and equips our customers - from law enforcement to military officials - with the confidence to achieve rapid identification anywhere,” said Jessica Westerouen van Meeteren, VP and Managing Director, Citizen Identity with HID Global. “Ensuring that our portfolio of proven solutions is optimized with the latest, best-in-class capabilities to create safer societies is key to our mission as a global leader in trusted identities.” Biometric reader hardware The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency The HID NOMAD 30 Pocket Reader’s PIV-certified sensor enables end-users, such as law enforcement officers, to quickly capture and verify single fingerprints against databases and eliminates the need to transport suspects to a central booking station. With Android and iOS availability driving wider adoption, officers can simply pair their own cellphone devices with the biometric reader hardware and perform watchlist matching within minutes while in the field, leaving custody space open for confirmed offenders. The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency and reduce time and booking costs associated with processing a suspect in a police station. During the first year of deployment, one city saw a six-fold increase in the number of suspects identified and more than $600,000 in savings. Extending biometrics to military bases As a provider of cellphone biometrics, HID Global also provides a broad range of biometric identity management solutions to customers beyond law enforcement. One of the company’s many offerings include the HID SEEK Avenger rugged handheld biometric reader that is used by military bases around the world to accurately identify individuals and provide access to their premises. The solution captures high-quality fingerprints and IAP-40 compliant iris images for verification against as many as 250,000 records and offers offline functionality in harsh environments where connectivity is compromised. HID recently extended the HID SEEK Avenger biometric reader with several features, such as support for Windows 10, an upgraded camera, double the memory and hard drive capacity for enhanced speed and performance, which expands upon its powerful watchlist matching capabilities.
Most companies around the world are facing a new reality because of the Covid-19 pandemic. It’s safety first, and the need for solutions that help companies re-open and remain safe is bigger than ever, especially for companies with a large number of firstline workers that are exposed to higher levels of risk. Turnpike’s wearable platform turns real-time data and machine learning into a concrete superpower. The solution provides managers and frontline staff a direct access to actionable information that enables improved safety and service levels. This Swedish innovation empowers co-workers to keep their social distancing at work, keep hygiene protocols, and advises them to stay away from exposed areas of risk, among many other accessible features. Cloud solution Turnpike’s cloud services collect signals and keep the firstline workers updated with relevant information The cloud solution, together with selected wearables, helps the firstline workers to understand the context of their working environment and enables them with intuitive tools to communicate with colleagues on the floor, warehouse and back-office. Empowering the firstline workers to stay safe and secure when delivering exceptional customer service. "We can provide the right data at the right time, in real-time, and to your wrist”, says Henrik Dimander, CTO at Turnpike Group. By using Azure IoT, Turnpike’s cloud services collect signals from the physical world and keep the firstline workers updated with relevant information. Access control The use of Azure IoT also enables Turnpike to interact with existing sensors such as smart cameras or wireless buttons in a secure and quick way. The integration with Microsoft Teams able automated flows with real-time or scheduled communication and extends the reach of Teams to include the firstline workers. Apart from pure safety features it also includes messaging, access control, task management, shift scheduling among other features. “Our mission is to empower firstline workers with actionable info the very moment they need to know without disturbing them”, says Carl Norberg, Co-Founder of Turnpike Group.
Invixium, a global provider of advanced touchless biometric solutions and CQR Security Ltd., a UK based manufacturer of detection devices, sounders and cabling for the global intrusion and access control markets, jointly announce an exclusive distribution partnership for the United Kingdom and the Republic of Ireland. As a respected global player in the intrusion prevention and access control markets, CQR brings nearly 40 years of trusted industry experience as a manufacturer and distributor of high quality security and access control products to over 60 countries worldwide. Invixium recently announced an upgrade for its flagship product IXM TITAN, which enables temperature-based access control and workforce management for businesses looking to reopen during COVID-19. As the only two-camera solution for simultaneous and touchless face recognition and Elevated Body Temperature (EBT) detection, the TITAN with Enhancement Kit achieves up to +/- 0.5°C (1°F) accuracy with ease. Outdoor installation capabilities When used in conjunction with IXM Health, a new feature within the accompanying IXM WEB software, the overall solution can be used to screen employees, visitors or individuals upon entry. Utilising innovative technology, the TITAN unit detects and records a precise temperature reading from the tear ducts of those individuals being scanned rather than a general heat mapping of the individual. The TITAN unit is also vandal-proof, IP67 and IK10 rated which presents a broader spectrum of outdoor installation options IXM WEB also enables businesses to customize their responses in the event of EBT detection, such as preventing access to their premises or sending push warning notifications to HR, security or management personnel. The TITAN unit is also vandal-proof, IP67 and IK10 rated which presents a broader spectrum of outdoor installation options. The TITAN unit is also vandal-proof, IP67 and IK10 rated which presents a broader spectrum of outdoor installation options. Temperature screening “Invixium and CQR have a shared passion and vision for developing and providing to the market integrated system offerings that can offer a differentiated value proposition to our customers,” said Stuart Adams, Managing Director at CQR. “At CQR, we care deeply about providing our customers with high quality, innovative and value creating products and services, and we have identified Invixium as a bespoke manufacturer of biometric solutions that complements our values as an organization. Invixium has an innovative range of cutting-edge security and access control products and services that can be applied across many industry sectors." "When considering the additional assurance provided by IXM TITAN’s thermographic sensor for temperature screening, I envision us being able to offer a more complete and integrated value proposition to our industry partners and end user customers. We believe that one of the primary advantages of the Invixium range is the ease with which their hardware and software can be integrated into existing system architectures and instantly add value whilst increasing overall employee and employer assurance during these uncertain times.” Virtual VIP event launch announcement “Instead of being inactive due to COVID-19, Invixium has been working tirelessly to develop a solution that serves a real-world need for these unprecedented times,” said Shiraz Kapadia, CEO and President at Invixium. “We’re proud that our products feature the design, durability and technology that companies need right now as global economies slowly start to re-open. Invixium is excited to partner with CQR given their stature as a premier distributor of security products. We don’t want CQR to be just a distributor; Invixium wants to see them become our operating partner in Europe. We are very much looking forward to growing together.” Invixium and CQR plan to jointly host an invite-only virtual VIP event to officially launch their partnership in the United Kingdom and the Republic of Ireland. Event programming includes a keynote address by Invixium’s CEO and live demos including the IXM TITAN Enhancement Kit.
Iris ID, a provider of iris recognition technology, announces it has entered into an agreement to provide its contactless IrisAccess biometric readers to Securiport, a global provider of cutting-edge airport security and border management technologies used by dozens of countries around the world. Securiport’s automated kiosks and gates authenticate people’s identities at airports, seaports, border crossings and other critical locations. Dr. Enrique Segura, chief executive officer and president, Securiport, said the addition of Iris ID’s biometric technology to Securiport stations enhances the convenience and safety of travelers, while also helping authorities prevent criminals from crossing borders undetected and uncovering unlawful transnational activities. Securing travel environment “Terrorists and other illegal travelers are increasingly using fraudulent travel documents at points of entry,” he said. “The Iris ID technology, with its reputation for speed and accuracy in verifying a person’s identity, is a valuable addition to our proven, proprietary solutions that deliver a more secure travel environment.” Securiport solutions equipped with Iris ID technology also will contribute to efforts to control the coronavirus Mohammed Murad, vice president, global sales and business development, Iris ID, said Securiport solutions equipped with Iris ID technology also will contribute to international efforts to control the current coronavirus pandemic. “Securiport’s solutions also include proprietary Epidemic Control System software to identify and control possible carriers of viruses such as COVID-19 and Ebola,” he said. Personal protective equipment “Our contactless technology can authenticate identities of people carrying digital health certificates without contributing to the spread of pathogens. Also, our readers are effective when used by people wearing personal protective equipment such as gloves, masks and goggles. We are seeing a big increase in demand around the world for non-contact and frictionless biometric applications.” Iris ID technology, including kiosk-mounted and hand-held readers, is used on six continents by governments to protect borders and correctional facilities. Healthcare organizations verify patient IDs and enterprise organizations use the iris-based solution for access control and employee time and attendance.
In 2019, the PSIA decided to have one of the most compelling demonstrations for its PLAI specification at ISC West 2020. It would rely on a cloud-based agent, which would allow attendees to badge and authenticate at various vendor’s stands who had implemented the spec. In 2020, technical development was progressing well and eight vendors were set to have PLAI implemented in devices and systems at their various booths and suites in Las Vegas. Of course, ISC West was canceled, but the group was able to do a quick reset for a Virtual PLAI Experience six weeks later. Synchronizing identity data The reception for the Virtual PLAI Experience was impressive, with over 400 people registered. On May 20, the event took place, with PLAI-enabled products in three countries (U.S., Ireland, and Switzerland) and seven states (Massachusetts, New York, New Jersey, Tennessee, Texas, Georgia, and Colorado) participating. The demonstration was conducted on Zoom which showed not only the main PLAI dashboard with products passing and synchronizing identity data, but also each participant’s product performing after card authentication. PACS and biometric systems The members of the PSIA were particularly gratified to see the enthusiastic response to our PLAI demonstration" David Bunzel, PSIA Executive Director, noted, “The members of the PSIA were particularly gratified to see the enthusiastic response to our PLAI demonstration. Hard work by the participating companies allowed us to show PLAI performing in a real-world environment similar to how it will be used in commercial implementations.” Two weeks later the PSIA hosted a Q&A session with industry professionals which provided time for deeper discussions on how PLAI could be deployed in enterprise applications. “The PSIA has demonstrated that PLAI is ready for commercial deployment,” said Consuelo Bangs, Sr. Program Manager at Idemia Identity & Security. “Our ability to pass identity data to multiple PACS and biometric systems and synchronize them in real time will offer a significant benefit to our customers.” Significant commercial implementations The PSIA has a video recording of the Virtual PLAI Experience on its site and is working on a condensed version of the demo to share with industry professionals. Momentum is building in the market for PLAI with a number of commercial implementations in large enterprise customers in process. “PLAI is satisfying a critical requirement for some of our large customers,” said Stuart Tucker, Vice President, Enterprise Solutions at AMAG Technology. “We expect to announce some significant commercial implementations of PLAI this year.”
A total of £1.6 billion worth of goods are reported as ‘lost’ to in-store theft in supermarkets each year, with figures increasing steadily. The presence of self-checkout systems have increased in supermarkets, as well as other industry retailers. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016. While this increase comes with such benefits as reduced wait times for customers and staff costs, it also comes with a risk of retail theft at self-checkouts. With the circumstances the world now finds itself in i.e. mass unemployment, financial uncertainty, the retail industry has seen an influx in these types of petty crimes, hitting retailers during an already turbulent period. While retailers are taking precautions to protect themselves and their patrons in this new era of in-person shopping, it’s important to ensure the business itself is protected. A popular method to combat these fears is to employ on-site security personnel, however, as we continue to adapt to new operating guidelines, retailers must begin thinking past the immediate future, and begin implementing long-term security solutions to prepare for life after lockdown such as strong CCTV systems with remote access. How has the security industry adapted its services to a post-lockdown world? Technological innovations like thermal recognition are key to adapting security systems for a post-lockdown world. Businesses which previously relied on facial recognition now must update their methods to account for shoppers wearing masks on-site and in-store. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016 Biometric systems are now able to identify people with face masks, and thermal recognition such ADT’s Thermi-Scan system which can track human body temperature without the need for contact. Implementing these safe protocol procedures protect both employees and customers against virus outbreaks such as COVID-19. The need for these advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027. Artificial intelligence has been hailed recently as the way forward for remote security needs, and while business-owners continue to navigate procedures of returning to work post-lockdown, having remote access to real-time security monitoring is essential now more than ever. What are the main measures stores can take to prevent or reduce theft? Strategically placing a multi-camera surveillance system to ensure clarity, eliminate blind spots, and deter thieves should be top priority. It’s equally essential to invest in a system which has an efficient playback program, particularly in situations where reviewing important footage efficiently can offer vital information to the police force. Advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027 As business-owners continue operating at reduced hours and with limited on-site staff, being able to access camera footage quickly and remotely is a key factor to consider. Whether owners opt to receive an alert on a mobile device allowing them to review notifications, or if their system is monitored by a remote security center, it’s important to be able to access footage quickly for added efficiency and ease. Facial recognition and AI have been popular points of discussion in relation to security cameras and CCTV. While careful considerations must be taken prior to utilising any sort of facial recognition technology, including conducting a Privacy Impact Assessment, the benefits include being provided with real-time tracking of repeat offenders which immensely helps the prevention of in-store theft. Here are some key points to consider when choosing in-store surveillance: Assess your needs – To get the best out of your security system, it is essential to analyze what your requirements are for your business as they might have changed to adapt to a post-lockdown world Camera setup – With store layouts shifting to accommodate social distancing guidelines, it’s important to re-evaluate the current set-up of any security cameras. Depending on any layout updates, it might be important to consider operating multiple cameras in one area to ensure a peripheral view and eliminate any blind spots Camera positioning – For optimal performance, check that light sources are not obstructing your view such as glare from the sun. It is also worth considering the height at which cameras are installed to maximize surveillance Check the focus – It is worth testing camera lenses bi-monthly to ensure that lighting or weather hasn’t affected the focus of the lens, resulting in a blurry visual Remote access – As guidelines continue to evolve, ensure you’re able to access any necessary camera footage quickly and safely in case of emergency Will we begin to see a reduction of theft as new technology is implemented? We’re beginning to see incidents of shoplifting and theft being taken more seriously by law enforcement. In the coming months, for the first time in Britain nearly twenty shoplifters who were either caught red-handed or identified on CCTV will be appearing before magistrates. While currently these court cases are being pursued by a private police force, these actions come after a Government plea to high-level police to prosecute shoplifters stealing under £200. Retailers have long voiced concerns that forces have abandoned low-level thefts and these steps are small but show that businesses are being heard. As innovations in surveillance security continue, we’ll be seeing a move away from human involvement which will create a more reliable and efficient system able to rely on machine learning and analytics. While there have been wider strides made in utilising AI for surveillance, these are largely being used currently by local governments to alert police forces to threats of criminal activity. It’s not unreasonable to think that in the near future, these types of smart technology will be employed by private businesses to analyze suspicious behavior or possible theft. However, as we see an increase in the advancement of security technology, we anticipate that those inclined to commit in-store theft will adapt their methods, therefore retailers should look to regularly evaluate their security needs to keep risks at bay.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
Modern working life has changed dramatically in the last decade. Driven by the growth of a millennial workforce, working behaviours and communications are more agile, digital and mobile than ever before. Remote working has risen 140% since 2005, a figure that will undoubtedly continue to rise in light of the pandemic. And its benefits are well studied: people are more productive, more motivated, and report a better work-life balance. The traditional office space and the digital collaborative working platforms we access both inside and outside of “work” have changed. In turn, there is a requirement for increasingly sophisticated access control and security products and systems. Today, and in the future, biometrics can play a crucial role in empowering workplaces both physically and digitally. Biometrics: accessing the right area Physical access and alarm systems are the first, and perhaps the most obvious area, biometrics is securing workplace access control – whether it’s to access office buildings, manufacturing floors, or even private rooms and safes. The humble key is easily lost and stolen, yet still represents 80% of door lock security The humble key is easily lost and stolen, yet still represents 80% of door lock security. And while digital solutions are gaining traction, PIN entry not only offers a poor UX, but requires close management, given its vulnerability to loss and misuse. Access fobs and badges pose similar challenges. Say, for example, an employee loses his badge to a restricted lab or highly confidential development centre on his commute - the security of the building is instantly compromised. By adding biometric authentication to cards or fobs, employers need no longer worry about them falling into the wrong hands. Without the correct user to authenticate, access to buildings, business operations and company files remain secure without needing to update any management systems. Moreover, by using this personal ‘on-device’ approach, employees no longer need to worry about the hygiene of shared sensors or PIN pads. Meanwhile, businesses can also avoid the technical and legal challenges of needing to manage a biometric database. A win-win. Touchless access Touch-free biometric solutions are another compelling way biometrics can not only improve security, but the user-experience and personalisation of security systems. Today, many touchless authentication solutions are combining the strong security of iris authentication with facial recognition to offer a compelling balance of security and convenience. This combination also means a reduction in false rejection due to physical changes, as it continues to authenticate even when wearing sunglasses, face masks or in bright sunlight, for example. Touchless solutions can bring benefits to numerous use cases and settings. Firstly, they can be utilized for mobile credential authentication on personal devices for seamless access to company servers, apps, or VPNs. It can also be implemented in traditional physical settings, offering the capability to alter access rights for personnel too. An R&D lab or healthcare setting is a good example here where restricted access to areas is in high demand, but would also benefit from a hands-free, seamless entry. OK computer Computers and laptops sit at the heart of the modern-day business set-up – whether at home, in the office, or on the move. In parallel, the evolution of modern working behavior changes has seen the number of applications, cloud-based services and shared VPN drives used reach an all-time high. While the benefits are numerous, the extensive PIN and password management that accompanies this is problematic. 6 out of 10 users felt they had too many passwords For users, they are a source of frustration and anxiety – our research found 6 out of 10 felt they had too many passwords, and worried about forgetting them. In turn, many are all too familiar with the laborious process of setting a complex password, forgetting it, and needing to reset again after several failed attempts. While complex password requirements (such as requiring capitals, numbers, and special characters) mitigate risk in theory, in practice they create a major point of friction in the user experience and require significant management. From a business perspective, security and cost concerns are even greater. Microsoft reportedly spends around $12 million a month on forgotten passwords. Worryingly, workplace security breaches are increasing too, with 54% of IT professionals reporting an increase in phishing attacks according to a recent Mimecast report. Here, the end-user is usually the weakest link due to easily guessed passwords, complacency, and the use of the same password across multiple apps and accounts. Biometric authentication via unique personal devices such as USB dongles, or by utilizing on-device authentication on a smartphone offers simple and frictionless way to increase security for the enterprise, free up IT teams and offer a better user experience to employees. FIDO-certified solutions are just one compelling solution supporting this. Plus, biometrics can also be used to authorize selected employees to access restricted areas of an organization’s network, protecting confidentiality. Meanwhile, with 80% of smartphones now featuring some form of biometrics, utilising biometric authentication for smartphone applications in the workplace can also be done at a relatively low-cost investment. Getting personal With more flexible working in place, many workplaces now operate a ‘hot desk’ system or share devices such as printers between colleagues. This is another instance where biometrics can be used to simplify access to personalized settings or employee accounts. In the future, this could even be integrated into wider office use cases, such as personalizing the air conditioning preference in meeting rooms or unlocking your personal settings on the coffee machine with a simple touch or gesture. More with multimodality Multimodality layers more than one type of biometric authentication to increase security and improve functionality and ease of use. For example, combining fingerprint with facial or iris to verify someone’s rights to access a secure manufacturing floor. While spoofing a fingerprint is challenging enough, spoofing a fingerprint and iris at the same time is near impossible. What’s more, by combining more than one modality, access control product manufacturers can reduce the false rejection rate (FRR) to deliver even smoother experiences. Secure, seamless authentication For enterprises, adding biometrics needn’t be a full ‘rip and replace’ solution. In fact, it can be added as a complement to existing solutions for added security without creating additional user friction. A biometric card or key fob can replace existing contactless access cards without big investments, or a biometric USB dongle can be added to email or VPN login to significantly enhance security, without infringing ease of use. A biometric card or key fob can replace existing contactless access cards without big investments To meet this demand, our access control service and solution partners are integrating biometrics for a wide range of physical and logical use cases. It’ll be unsurprising that locks and alarms are top of the list, but with the rise of widespread remote working over the last 10 years and the fight against PINs and passwords being led by organizations like FIDO, logical access for VPNs and work and time attendance, for example, are coming to the fore. Overall, biometrics can not only play a role in securing the modern workplace (wherever that may be), but can also give time and money back to IT and security teams. Most importantly, it can be a tool to empower workforces, driving efficiency and productivity through improved convenience and greater flexibility over how, when and where they work.
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls? For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions. “There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.” Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”. Challenge 1: Ensuring building readiness After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped. Challenge 2: workforce management There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office. Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns. Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation. Challenge 3: Controlling access The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions: Where have you visited in the days since last entering the workplace? Have you come into contact with anyone else who has recently visited high-risk areas? Have you shown any symptoms of infection in the past xx number of days? Policies should be implemented that require employees to be screened regularly — and for an extended amount of time If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organizations— often multiple times a day. This applies to interactions at delivery bays, too. A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity. Challenge 4: Social distancing and contact tracing plan Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only. Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies. Challenge 5: Reduced physical touchpoints Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access. Challenge 6: Communicating for confidence Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
Family-owned and run company, Bijou Wedding Venues, that offers exclusive wedding venues coupled with exceptional food and service, is improving its safety in response to the COVID-19 pandemic by implementing a state-of-the-art body temperature monitoring solution from ANT Telecom to reduce the risk of virus transmission. With restrictions lifting to enable larger groups of people to meet, weddings can begin to take place with greater numbers of guests. Bijou therefore wanted a solution that could enable special days to go ahead with confidence and reached out to ANT Telecom to implement its thermal imaging cameras at wedding venue entrances to ensure a significant reduction in risk to guests. Temperature monitoring cameras With Bijou operating across a range of venues, the cameras will be used to scan guests discreetly as they enter the venues to ensure minimum disruption to the day, and allow full focus to be on the couple’s celebration with families and friends. It comes as part of a range of other initiatives the company is implementing, such as changes to seating arrangements to ensure ample distancing; provision of outdoor ceremonies where possible; new methods of serving food and drink; as well as many other adaptations to minimize risk. ANT Telecom’s temperature monitoring cameras can be set up very quickly and are easy to use. The camera can detect multiple people at the same time, so is perfectly suited to scan wedding guests entering the venue. Protect guests and staff Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption" Sam Cutmore-Scott, Managing Director, Bijou Wedding Venues, comments: “We’ve made a range of changes in light of the pandemic to ensure that weddings can continue as planned and we’re pleased to offer couples this extra layer of safety alongside other measures. The temperature monitoring cameras allow us to protect all of our guests and staff right from the entrance of the venue. This is one of our key initiatives, and on top of this our exclusive venue model means venues can be completely sanitized between events and essentially acts as a private home for the couple, unlike hotel venues which have other people and staff entering and leaving the site.” Discreet notifications Upon camera detection of a temperature above the guidelines, that guest can be discreetly notified by a nominated person on behalf of the couple and alternative arrangements made, for instance inviting them to watch live streamed footage of the ceremony. Klaus Allion, Managing Director, ANT Telecom, states: “We’re delighted to support Bijou in enabling couples’ memorable days to continue and take place as close to as expected as possible. Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption and peace of mind for both the couple and guests at the venue, as well as staff. It’s an essential component of hospitality and event management and will help many types of gatherings similar to this take place safely as the fallout from the pandemic continues.”
Edgeworx, the edge computing company, has launched a new AI-powered camera called Darcy to help protect workplaces of every size. In addition to detecting signs of fever, Darcy’s AI engine identifies whether individuals are wearing a face mask, tracks self-reported symptoms and delivers a quick, comfortable screening experience ideal for high-traffic environments. Organizations currently face an impossible choice between affordable, but ineffective, temperature readers (such as point and click devices or tablets) on the one hand, and cost-prohibitive medical-grade thermal cameras on the other. Affordable and accurate thermal camera Darcy ends this dilemma by offering the accuracy of a precision thermal camera at a fraction of the price. Darcy costs less than a fifth of the price of competing FDA-compliant thermal cameras, putting it within reach of schools and small businesses as well as enterprises and large retail outlets. To further ensure screening is accessible to all, Edgeworx is offering the first camera free to all public schools. The solution is already being piloted in Bay Area and New York schools. Despite their five-figure price tags, precision thermal cameras are slow, ungainly, inaccurate and hard to operate. Some take as much as an hour to warm up and need regular recalibration. By contrast, Darcy uses artificial intelligence and smart-room sensors to do the work of expensive hardware. Real-time alerts Safety checks will become a feature of daily life as we return to our schools and workplaces" Darcy logs self-reported symptoms via a cellphone app, and checks for temperatures in less than a second, keeping lines moving and avoiding dangerous congestion at entry points. It provides real-time alerts and data reports so organizations can spot outbreaks early, take appropriate action and demonstrate compliance with public health mandates. It can be updated with additional features (such as AI for social distance checks) as public health practices evolve, no additional hardware required. Darcy provides peace of mind to businesses, employees, and customers. Schools and workplaces safe re-openings “Safety checks will become a feature of daily life as we return to our schools and workplaces. But many of these checks will be ineffective because organizations can’t afford high-end solutions that cost tens of thousands of dollars so they rely on devices that have been hastily thrown together and are inaccurate. That has to change,” said Farah Papaioannou, President and Co-founder of Edgeworx. “We developed Darcy because we knew we could use our AI, data and edge computing knowledge to really help people struggling with the challenges of re-opening. We’re focused on protecting all workplaces with a solution that’s affordable and accurate today—and is smart enough to adapt as the world’s knowledge of COVID-19 and other viruses evolves in the future.” Darcy secures Manhattan preschool Manhattan preschool program Kids At Work is among the organizations using Darcy to create a reliable and reassuring screening experience for children and staff. "We were searching for a health check solution that would give families peace of mind and be non-intrusive for our student population, from infants to five-year-olds,” said Julie. Darcy reads temperatures with a margin of error of 0.5 degrees Centigrade Averill, founder at Kids At Work. “Darcy checked all our boxes with its seamless experience, easy record-keeping and affordability. We're also thrilled with the day-long temperature monitoring feature. As an owner, I feel so much more confident about reopening with Darcy.” Darcy owes its speed, precision and low cost to Edgeworx’s edge computing fabric, which allows Artificial Intelligence (AI) to run on the device rather than in the cloud. Darcy’s AI performs many of the functions that require expensive hardware on other devices. Key benefits include: Accuracy and reliability Darcy reads temperatures with a margin of error of 0.5 degrees Centigrade. It overcomes the traditional challenges of contactless temperature monitoring with several innovations: Using AI, Darcy identifies where on a person’s face the reading should be taken, determines if they are close enough and whether they are wearing anything, such as a headband or sunglasses, that would interfere with an accurate reading, and automatically adjusts to body temperature fluctuations caused by circadian rhythms throughout the day and even the weather outside. To offset the effect of room temperature on a reading, most thermal cameras require an expensive scientific instrument called a blackbody reference unit, which maintains its own temperature and is used to calibrate the reading from the camera. Faster readings and less prone to Errors By contrast, Darcy calibrates its readings against inexpensive smart sensors that attach to objects around the room, read the temperature of those objects and report it continuously and wirelessly to the camera. Not only is this significantly less expensive, but also less prone to failure, requires no maintenance and means the camera can be moved without triggering a lengthy recalibration process. Darcy takes readings in less than 100 milliseconds and uses data processing to identify any anomalies. As a result, by the time a person has approached the camera, Darcy may have 10 to 40 readings and can ensure that only a reliable one is recorded. Traditional cameras take only one reading, whether reliable or not, increasing the chances that a person with fever is not detected. Check mask usage and symptoms Darcy goes beyond temperature scanning to help organizations identify high-risk individuals who may not have a fever. Its AI identifies whether the individual is wearing a mask and allows organizations to conduct efficient wellness checks: Visitors complete a symptom survey from their home or phone via an app, which generates a unique QR code to be scanned by Darcy at entry. Additional features can be easily deployed so these devices can adapt as new practices come into play, without costly hardware changes. Avoid long lines and unsafe crowding at entry pointsBecause all the processing happens locally on the camera rather than in the cloud, performance is dramatically improved, avoiding the need for delays while a person’s temperature is checked. Beautifully designed, unobtrusive and with a friendly interface, Darcy makes screening quick, easy and unintimidating. By installing additional cameras in pass-by mode, schools and businesses can continue to monitor temperature and mask usage throughout the day—and throughout the building—without interrupting schedules. Get real-time alerts and compliance reports Darcy provides warnings via SMS, email, app or desktop notification so organizations can get early warnings of facilities where symptoms are trending and create a complete audit trail for compliance with public health mandates. Armed with data, organizations can make informed decisions and implement targeted measures rather than resorting to broad closures. Built-in privacy and securityBecause Darcy handles storage and AI processing locally, it never sends images or sensitive personally identifiable information (PII) to the cloud. subscription Organizations can choose from two subscription packages and schedule a demo - Monthly subscription - Yearly subscription Until the end of 2020, Edgeworx is donating a free camera to any public school that purchases a subscription. To apply for a free camera, one may contact Edgeworx.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enroll and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualized in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customizable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
Synectics has secured a multi-site protection contract for a customer whose infrastructure assets are considered critical to national security. Responsible for maintaining an energy network that supplies over 3.9 million homes and businesses, the customer required a centralized system to guard against both physical and cyber threats at five key sites – each recognized as a national asset with corresponding levels of access clearance. The Synectics solution, driven by its Synergy 3 command and control platform, integrates third-party sensors, analytics, cameras, systems, personnel databases, and edge devices. The resulting level of situational awareness gives the team – based at the customer’s state-of-the-art Alarm Receiving Center (ARC) – complete oversight and control of security, safety, and site-management systems at each facility. Electrified perimeter-fence systems As part of the contract, Synectics will also provide a redundant ARC solution for failover scenarios. The core integrations included as part of the project ensure alerts and responses are linked to, and can implement direct control of, door-access systems, intrusion-detection systems, intercom technology, and the electrified perimeter-fence systems deployed at each location. Synectics will conduct a complete system FAT, which includes all specified third-party software and hardware, at its dedicated UK testing facilities. Given the high-risk, high-security nature of the project, the provider’s ability to system-test at such scale was a crucial factor in the contract being awarded. The five locations to be monitored from the ARC are government-authorized to trigger armed response units to deal with imminent or actual threats. Command and control system In addition to meeting technical resiliency specifications, Synectics will be providing cybersecurity consultation The solution will, therefore, employ customized workflows to support incident (alarm) validation and protocol-compliant responsive action. The solution will also see each site equipped with its localised command and control system for on-site management, with the ability to manually and automatically escalate incidents to the ARC team as required. Cybersecurity was a specific focus of the brief. In addition to meeting technical resiliency specifications with authentication and encryption solutions, Synectics will be providing ongoing cybersecurity consultation, working in partnership with in-house specialists to ensure the continuous development of protective measures. Third-Party system Martin Bonfield, UK Sales Manager at Synectics, commented: “The perfect alignment between customer requirements and Synectics’ track record in CNI meant the lead integrator came directly to us with this exciting project. Our credentials and expert team, coupled with Synergy 3’s ability to remotely integrate and interoperate with any third-party system vital to effective operations, meant we ticked multiple boxes." "We are regarded in the industry as a safe pair of hands with the relevant experience, and an innovator with the forward-focused technology required to meet all aspects of the brief.”
Round table discussion
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?
The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?