Biometric time and attendance
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features while exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providin...
ELATEC is pleased to announce its recent hire of Ron J. Fiedler, who joins the ELATEC team as Vice President of Strategic Alliances. In this role, Fiedler will expand ELATEC’s global presence through business development, strategic partnerships, and penetration of new markets. ELATEC RFID readers ELATEC designs and manufactures unique radio frequency identification (RFID) readers for user authentication and access control applications. ELATEC readers recognize and decode over 60 RFID tra...
Senstar, global provider of video management and perimeter intrusion detection solutions, is pleased to introduce two new products at ISC West - Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection system for fence applications. Symphony AC is an open software solution designed to support the industry’s most trusted brands of access control and intrusion hardware. Available as an extension to the Symphony Video Management Software (VMS), the module...
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is debuting the company’s Maxxess InSite Awareness and Response Coordination System to the American market here at ISC West 2019 (booth #6065). Maxxess InSite uniquely combines security, communications, business intelligence and data integration on a single, easy-to-use platform. “Maxxess InSite empowers total awareness by providing users with unprecedented capabil...
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID s...
Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating in ISC WEST 2019, Las Vegas, USA on 10th April 2019. Matrix will be showcasing its comprehensive range of IP video surveillance, people mobility management - an innovative range of access control and time-attendance solutions at the event. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organizations. Matrix is known for offering technology driven,...
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for access control applications. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records Access control is critical for healthcare institutions in order to protect patient safety and meet stringent HIPAA requirements for medical information privacy. Radio frequency identification (RFID) readers are an effective and efficient means of user authentication to ensure that only authorized personnel can access patient health records, change settings on medical devices or gain access to restricted medications, equipment or supplies. Better Security Than Passwords RFID readers are more secure and easier to manage than passwords, which are easy to share and often forgotten, creating both security risks and an unnecessary IT burden. Password systems also slow down medical personnel, requiring them to remember and enter passwords into different devices, often under emergency conditions or extreme time pressure. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records, supplies and equipment they need to perform their jobs. ELATEC readers are already widely used for secure print management and other healthcare ecosystem applications such as time and attendance, computer single sign-on, room scheduling, pharmaceutical and high-value supplies dispensing, and medical equipment access control. Recognize 60+ RFID Proximity Card Transponders ELATEC RFID readers can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone BLE and NFCThere are dozens of RFID card technologies in use globally, creating challenges for hospital systems and device manufacturers wishing to implement RFID for access control beyond the front door. While other systems only recognize a few proprietary technologies, ELATEC RFID readers are universal. They can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone Bluetooth Low Energy (BLE) and Near-field Communication. They are also certified for use in 110 countries. This means that large hospital systems that may be using multiple card technologies across different locations due to mergers and acquisitions can rely on a single reader type for access control and user authentication for all the other devices and systems they use. For medical device manufacturers and software developers, ELATEC readers provide a ‘single part number solution’ that allows them to sell their RFID-enabled devices into practically any hospital system throughout the world without worrying about what kind of card technologies their clients may be using. Cost-Efficient And Longer Durability "We describe ELATEC’s readers as being future proof,” explained John Tepley, President of ELATEC USA, Inc. "There are numerous technologies used for various applications throughout the region and the world, which means companies that want to integrate RFID into their solutions must be prepared to handle many different RFID transponder technologies. ELATEC is uniquely positioned to meet these challenges." ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements, so they are inexpensive to maintain and will remain usable longer than competing reader technologies. As the healthcare ecosystem becomes more connected and complex, and the FDA puts increasing emphasis on cybersecurity risks for medical devices and software applications, developers need smart, easy solutions to close security vulnerabilities around user access and authentication. RFID provides fast, easy and secure authentication for all kinds of medical devices and applications. ELATEC readers can help developers meet emerging security challenges and address the needs of their healthcare clients.
Matrix Comsec, global manufacturer and provider of Security and Telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida to be held from 30th Jan to 1st Feb 2019. Matrix will be showcasing its comprehensive range of people mobility management, IP video surveillance and unified communication solutions at the event. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance applications catering to diverse and complex deployments especially for the SMB, SME and large enterprises. SPARSH VP710 Video And COSEC ARGO Door Controller Enterprise video collaboration solution, SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities. SMB IP-PBX, SPARK100, an all-in-one communication solution with enterprise-grade unified communication and collaboration. Next generation door controller, COSEC ARGO for the access control market. The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistant (IK08). Matrix IP Video - Access Control Integration Matrix will also be demonstrating seamless integration between Matrix IP video surveillance, access control and unified communications solutions, along with Matrix video management and device management software suite. Additionally, at this event, Matrix will exhibit its range of Gateways. These gateways allow easy integration with most of IP-PBX, TDM PBX, Softswitch and hosted solutions. Award-winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions for multi-site connectivity and remote survivability while offering superior voice quality and state of the art routing features.
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique Identification Authority as part of the country’s national identity program. Registrations, known as Aadhaar numbers, are used for Indians to apply for a passport, obtain a driver’s license, receive social services and many other daily activities. More than 1 billion citizens are enrolled in the program. Used For Access Control, Time And Attendance Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in IndiaMohammed Murad, vice president global sales and business development, Iris ID, said the BIS certification is similar to Underwriters Laboratories (UL) standards found throughout the world and the CE mark used in Europe. “We’re pleased to have received BIS certification as India is a very important market for Iris ID,” he said. “Our products are used not only by government agencies, but also by many commercial organizations.” Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in India. Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
Evolis, global provider of personalization systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business development and maximize the chances to establish a long-term presence in Japan. Card Personalization Solutions Evolis Japan’s mission is to expand the traditional distribution network, develop a new network dedicated to new sectors and to strengthen its ability to reply to demands of government bodies and financial institutions. "Japan is one of the world’s leading economies with more than 125 million people. We therefore see strong potential in several key markets for card personalization. The creation of a Japanese company will help us reinforcing our existing business relationships and facilitate the development of new partnerships" says Emmanuel Picot, president of Evolis.
Having returned from Security Essen, Traka’s International Sales Director, Martin Woodhouse, reflects on the show and why it was so important to attend for the industry leader in innovative key and equipment management systems. Q: How was the show? Martin Woodhouse: Security Essen was great in allowing us as a global brand, and part of the ASSA ABLOY Group, to demonstrate how we are listening to our customers (new and existing) and responding with latest advances in intelligent solutions for keys, lockers, software and dedicated products. Q: Why did you think it was important to attend? Martin: Security Essen is an established exhibition for the European market but even more important for the German one. It continues to lead the way as an important global event for the world security market to come together, to tackle the latest security challenges and share new and innovative ideas. This year, particularly, concerns were cited about the impact of Brexit and its influence on the market, together with more intricate security issues such as cybersecurity and data protection. It was really important for Traka to attend, not only to display its latest solutions and services but also to be part of these important conversations, so that together as an industry, we can pull together and have the solutions and answers ready. Q: Did you pick up on any particular trends at the show? One of the main themes of the show was the focus on smart security and integration Martin: One of the main themes of the show was the focus on smart security and integration. We are increasingly living in a far more connected and online environment, where the speed of data and the cause and effect on how to manage situations is becoming faster and simpler to instantly analyze a situation, with the necessary reports required available. From a security and data perspective, both on and offline, clients expect more, they do more research and they know what they are trying to achieve. They want to choose a partner that can provide integrated, all-encompassing bespoke solutions and achieve compliance as standard. It’s something Traka certainly has focused on to deliver bespoke solutions, integrated to suit a specific customer environment. Q: Was there a specific focus for Traka at Security Essen? Martin: For Traka, Security Essen was an opportunity to demonstrate how we can help businesses operate to minimize operational costs, increase productivity and ensure the efficient use of company assets. We demonstrated how our latest solutions can make sure every part of an organization is protected, right through to critical data facilities, an increasingly integral part of any security remit in today’s world. And due to the open nature of Security Essen, it was the perfect opportunity for Traka to discuss bespoke customer requirements across a number of different vertical sectors; from education to healthcare, hospitality to transport. Finally, Security Essen was the right international platform to present our proven integrated solutions. We wanted visitors to see for themselves how easy, intuitive and comprehensive our systems are, and with full audit capabilities, how they can present an all-encompassing safe and secure solution with tangible ROI benefits. Q: Could you tell us more about the products displayed at Security Essen? Our latest Traka Web central software management was at the heart of our display as an enterprise class web-based administration software platform Martin: At Security Essen, the range of products and services on show was focused on our core capability to secure, manage and audit the use of almost any physical asset, including: premises, devices, secure areas, data centers, equipment, machinery and vehicles. Our latest Traka Web central software management was at the heart of our display as an enterprise class web-based administration software platform, enabling complete management of Traka Touch key and locker systems from any device, even remotely. We presented live demonstrations of our integrated solutions, including our popular Rack Manager, which offers electronically controlled access to every server rack door in a data centre, with the ability to scale up to suit evolving infrastructure environments. We displayed Traka’s new V-Touch compact key management system, designed to offer controlled access management for critical keys at locations where space is limited and up to 5 keys need to be managed. Q: Could you tell us more about your integration capability? Martin: At Security Essen, we were lucky enough to be able to be able to demonstrate on our stand, Traka’s integration capability with Lenel and Nedap. We are extremely proud of our track record of integrating with third party systems with such leading companies. We believe it goes a long way to ease the burden of administration for our customers and present unique opportunities for controlling critical processes. Traka International and ASSA ABLOY exhibit solutions at Security Essen The Traka integration ‘engine’ ultimately allows for real-time, two-way communication with access control platforms, HR databases, time and attendance, and many other user systems. And there are a host of further benefits: The Traka integration ‘engine’ ultimately allows for real-time, two-way communication with access control platforms User profiles and access permissions can be easily populated and managed on an existing database. Automatically enrol users and define security settings based on employee status or department assignment Custom workflows can be tailored to the needs of an organization to generate actions, notifications or access restrictions based on the status of important assets ensure valuable assets and keys don’t leave site. Q: What are your aims on an International basis for Traka? Martin: Traka was the manufacturer of one of the first electronic key management systems – and we are now considered as world leaders in innovative technology for sophisticated, intelligent key and equipment management solutions to manage and control access to important assets. Even in such an industry leading position, recognized on a global basis, in the UK and in over 40 countries worldwide, we are far from complacent. We continue to evolve our solutions and professional services and continue to not only meet but exceed the requirements of our customers. This is not only from a product perspective, but also our service capability to offer advice right from initial design and specification stages to installation, project completion, handover and ongoing maintenance, across every sector. Naturally, we want to grow and evolve into more countries and increase our network of certified channel partners; but we can only do this if we continue to listen to the demands of the different market needs. Q: And what about Traka in the UK? We believe the transition to more intelligent systems, such as Traka solutions, will be more aligned with everyday life Martin: It’s surprising how many business and commercial owners still rely on manual processes and paper recording, for key and equipment management and control. Our aim is to prove how simple measures can make a difference. It’s not only the security of a business’ assets but also to reduce the cost to an organization through accidental damage, theft, personal injury and downtime. It also helps enforce business processes and ensure health and safety compliance. Ultimately, it’s a mindset. We believe the transition to more intelligent systems, such as Traka solutions, will be more aligned with everyday life. Q: How important is it to be part of ASSA ABLOY Group? Martin: Being part of the global leader in door opening solutions is a massive advantage for Traka. ASSA ABLOY’s products and solutions serve just about every conceivable application around the globe. The real credit to the group is its ability to understand Traka is a bit unique within ASSA ABLOY, because we provide different types of solutions to its traditional core. So, we’ve continued on as a separate business both in the UK and on a global basis, and only integrating where it makes absolute sense into the larger organization. An example of this is the integration between Traka and ASSA ABLOY’s advanced security CLIQ Web Manager software solution. The result is a key management process that is proven to significantly reduce maintenance costs and save administration times. Overall, it’s been impressive with the people and the technology within the company that we are able to tap into as and when required. The ASSA ABLOY solutions brand is one we are proud to be associated; a one-stop shop for all door and hardware opening needs. The ASSA ABLOY brand will continue to grow as a leader in opening solutions and access solutions. Q: What’s next for Traka? One of the key aspects we are focusing on is the move to present solutions dedicated to each market segments from small to global companies Martin: Traka is never one to stand still. We will continue to evolve as a company and invest in research and development. One of the key aspects we are focusing on is the move to present solutions dedicated to each market segments from small to global companies. By example, most recently in the UK, we have seen success in the launch of lockers specifically designed to store body worn camera technology, primarily for the likes of prison and emergency services but also in schools and community buildings. Not only did this require a solution to ensure the equipment is safely secured, but also that it is charged and instantly ready to use whilst in storage. At the same time any solution needed to help organizations, who had invested significantly in the technology, operate a ‘pool’ system rather than having to invest in a device per member of staff. This is just one example, with a very specific product requirement that Traka was able to work closely with the sector to understand the issues and create a solution. It demonstrates a commitment to design, in how our products operate and evolve to meet market needs, both in the UK and across international markets.
Plasco ID, global integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, he will focus on business operations and strategic initiatives. Physical Card Access Control A veteran in visual and physical card access control, Jeff formerly held the position of President at Bristol ID, global technology card business; prior, he served as General Manager for Brady’s People ID and IDenticard business units. This hiring directly correlates to Plasco ID’s customer-centric philosophy and strong commitment to customer service excellence. The secure ID solutions company continually leads industry innovation, with a mission to providing customers with the best solutions available to meet their unique business needs. Proximity Technology Cards Partnerships with the industry’s best manufacturers has resulted in exclusive printer offerings with unique benefits. In addition, the organization has launched its own brand of proximity technology cards, allowing it to pass along significant cost-savings to its customer base. Most notably, the organization developed the first subscription and cloud-based ID card management software, allowing an unlimited number of users to manage, design and print their card program from any location, any time. “We are pleased to welcome Jeff to the Plasco ID family. It is an exciting time for our organization as we add this new role to further bolster our senior executive team. Jeff brings a unique skill set that will enhance our ability to execute on both our strategic growth and improvement initiatives,” stated Alan Mendelson, Plasco ID President and CEO.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security And Privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximize the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security Industry Role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetized, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High End Sees Growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralized control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market Threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Workplace mobility is on the rise, which means organizations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situations. One of the major worries for an organization is the safety of its employees, whether they’re on-site, at a different office location, on-the-road, in the field or in the air. When disaster strikes, organizations need to quickly communicate with their employees in case of a location-based event (active shooter, fire, explosion, natural disaster or terrorist attack) to help protect their safety and direct them to take specific actions. For example, if there are angry protesters in the same area an employee is traveling, it is important to be able to notify that person to keep them out of harm’s way. Employer Duty Of Care This leaves companies with a tough task – do you know where your people are at all times? How can employers fulfill their Duty of Care and ensure employees are safe in times of crisis, no matter where they are located? This is easier said than done. According to Ernst & Young’s latest Global Mobility Effectiveness Survey, only 30 percent of companies have a system in place for tracking business travellers. In addition, contractors, visitors and vendors are difficult to reach and account for when traveling in and around your facilities. But, with the help of timely location data collected from building access control systems, wifi access points, travel management systems and more, safety-conscious organizations can automatically keep employee locations current – even when employees are traveling or moving between buildings and campuses. In such instances, organizations can improve security preparedness and employee safety by harnessing location-based technologies that help them ensure they can send the right message at the right time. The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Dynamic location tracking and alerting has huge potential for safeguarding the well-being of mobile workers. Many organizations have started to integrate critical communication solutions with physical security systems to rapidly identify, communicate with and account for employees during these disruptive events. Everything from modest access control systems to sophisticated biometric systems can track specific employee movements When implementing location-aware alerting systems, it’s important for organizations to keep the following best practices in mind: Aggregate Location Data Across Multiple Systems The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously – meaning employee locations (or, at the very least, last known locations) can be automatically acquired. Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication for rostering, mustering and site evacuation purposes at the moment emergencies occur. Merge Travel Risk Management With Location Alerting But what about when someone is working remotely or traveling? Corporate travel management tools, and travel security services companies like International SOS, provide specific travel details and itineraries for individual employees – so you know where they’re traveling to, how they’re getting there (airplane, bus, train), as well as where they’ll be staying once they get there. Data doesn’t exist in a silo, so a good location alerting system will aggregate and store data from as many sources as possible. This enables organizations to locate and communicate with staff during global events and emergencies and help determine if they are safe or need assistance – no matter where they are. Again, this helps you meet your Duty of Care to keep your team safe at all times. Ensure Employee And Building Databases Are Accurate Location-based notification systems, from badging systems to Wi-Fi access points, need quality data that is up-to-date and accurate in order to effectively reach an organization’s employee base. Traditional methods of importing data, including importing spreadsheets and call lists, just won’t cut it. While these sources important contact path information like landline numbers and addresses, they clearly lack the many other contact paths that employees will be most likely to notice right away while traveling, such as cellphones and email. Collecting correct and relevant contact data, such as personal or BYOD phones, can ensure that messages are received and responded to by relevant employees. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees Automate Communication And Collaboration Once location data is gathered and stored, it must be connected to an incident communications solution that can instantaneously distribute targeted alerts in the case of an emergency. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees. When a location-based emergency occurs, the systems that can send messages to a targeted geographic region – whether that is a specific building, floor, neighborhood or zip code – instead of the entire employee directory, will be the most effective in ensuring the right messages are sent to the right people. Additionally, if recipients can acknowledge that a message was received, it allows organizations to identify who is safe – and who may still be in harm’s way and needs help. Every Minute Counts Let’s say a fire breaks out in a corporate building on the fifth floor and an emergency alert is sent out to all employees in the building. You know that three employees used their security badges to swipe in to that floor earlier that afternoon, but only one responded to your emergency alert. Because you have enabled two-way communications and expect responses from employees that are safe and unharmed, you now know that there is a very real possibility that the other two employees are incapacitated and could be in immediate danger. Building upon this idea, systems that enable employees to initiate communications are much more impactful in protecting their safety in location-based emergencies. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organization’s security team – automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button. During critical events, man-made incidents or natural disasters, the ability to identify and reach employees with reliable, automated communications that harness geo-intelligent tools can not only protect your business assets, but can be the difference between life and death for your staff. Because every minute counts, you can’t afford to waste time searching spreadsheets, directories and schedules to notify your employees. Automated communications that utilize available location data enable organizations to connect with employees more effectively, helping to ensure their safety during critical events worldwide.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behavior and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analyzing Body Recognition Factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognizing the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analyzed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognized. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behavior and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognize people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorized to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kickoff ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kickoff this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrolls in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project Specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC Time-Attendance Solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralized location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organization Continuous operations with excellent service support Biometric Access Control Solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘Sanjivani buty’ was brought for revival of life. The Sanjivani Rural Education Society (SRES), was established by Honorable Shri. Shankarrao Genuji Kolhe in 1983, at Kopargaon, rural domain in Ahmednagar district of Maharashtra, India. Identify Unauthorized Person The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land As the educational scenario changed with time, SRES understood the need and added a number of courses under the umbrella of the Sanjivani Rural Education Society (SRES) and consequently it gave birth of the Sanjivani College of Pharmaceutical Education and Research, Sanjivani Senior and Junior College, Sanjivani Academy, a CBSE school and Sanjivani International school. The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land. There are different departments in various buildings, playgrounds, hostels and staff quarters. Due to vast area and huge numbers of students, it’s very difficult for management to identify unauthorized person inside the campus. In the past, many instances of bullying, robbery, theft, ragging and pick-pocketing were reported. Up-To-Date Surveillance Solution With the expansion of the Sanjivani Group, there were many challenges faced by students and staff in terms of safety and security. “Consequently, we took our first step towards it by installing Hikvision IP CCTV surveillance in all our campus areas for monitoring. The clarity and the quality of the camera is appreciable and satisfying,” said Amit N Kolhe, Managing Trustee, Sanjivani Rural Education Society (SRES). He further added, “Presently the security technology has changed a lot. While understanding the need of safety and security of the students, we decided to go for an up-to-date surveillance solution. We contacted Prama Hikvision team and their system integration partner Om Agency for an advanced solution. After understanding our requirements, they introduced some of the latest technologies related to security surveillance.” Facial Recognition Devices The same software can be used by seamless integration for time attendance, access control and surveillance" He further elaborated, “After this we finalized the key areas by conducting the security survey in the campus. We got many advanced solutions implemented with help of SI partner and Prama Hikvision team. The solutions included, ANPR cameras for number plate recognition of cars and bikes at entry and exit gates, facial recognition devices for time attendance and access control of students & staff members.” “The advantage of Hikvision security and surveillance products is that things can be monitored through a single software platform, i.e. IVMS 5200E, which comes as all in one software. The same software can be used by seamless integration for time attendance, access control and surveillance,” concluded Amit N. Kolhe. Access Control Systems By visiting Sanjivani Group of Institutes along with System Integration Partner Om agency, the following solutions based on the latest technology and products were adopted: Automatic Number Plate Recognition (ANPR) cameras Tripod turnstile integrated with face recognition panels HD IP cameras A broadcasting solution for the seminar rooms Face recognition based access control systems Hikvision solutions delivered results: ANPR Cameras helped the institute to identify unauthorized vehicles at entry gates, through which they stopped many outsiders in getting entry into campus area. Face recognition panels and access control panels helped institute in getting entry and exit record of students as well as visitors. Through the large number of cameras installed at various locations, the management is able to keep an eye on the entire campus. One-Stop Solution We are proud to execute this project with support of Prama Hikvision" “Implementing IP Surveillance project for Sanjivani Group of Institutes, Kopargaon was a great learning experience. We have built a strong relationship with Prama Hikvision over the past 10 years. They work with vendor partners to deliver solutions that suit the requirements. The efficient professionals and quality of service is appreciated.” said Mr. Hemant Rokade – Director Sales, OM Agency. “We are proud to execute this project with support of Prama Hikvision. It was a huge challenge to execute the project of such gigantic proportions. While implementing the project, Prama Hikvision helped us through the project at every step. We appreciate the level of details and accountability, which Prama Hikvision has demonstrated in this project. This reaffirms our faith that Hikvision is the one stop solution for all security and surveillance solutions,” said Mr. Pravin Rokade – Director Operations, OM Agency.
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless Facial Recognition System Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early Success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time And Attendance System Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorized access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher Single Access Card Control System Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Center Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Center central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast Facts About The Project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilized: Command Center Controller 6000 T-Series readers Tag Boards Car park Management
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy Attendance Management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis Of Employees’ Attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralized Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?