Biometric time and attendance
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID s...
Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating in ISC WEST 2019, Las Vegas, USA on 10th April 2019. Matrix will be showcasing its comprehensive range of IP video surveillance, people mobility management - an innovative range of access control and time-attendance solutions at the event. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organizations. Matrix is known for offering technology driven,...
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for acce...
Matrix Comsec, global manufacturer and provider of Security and Telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida to be held from 30th Jan to 1st Feb 2019. Matrix will be showcasing its comprehensive range of people mobility management, IP video surveillance and unified communication solutions at the event. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance app...
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique I...
Evolis, global provider of personalization systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business developm...
Having returned from Security Essen, Traka’s International Sales Director, Martin Woodhouse, reflects on the show and why it was so important to attend for the industry leader in innovative key and equipment management systems. Q: How was the show? Martin Woodhouse: Security Essen was great in allowing us as a global brand, and part of the ASSA ABLOY Group, to demonstrate how we are listening to our customers (new and existing) and responding with latest advances in intelligent solutions for keys, lockers, software and dedicated products. Q: Why did you think it was important to attend? Martin: Security Essen is an established exhibition for the European market but even more important for the German one. It continues to lead the way as an important global event for the world security market to come together, to tackle the latest security challenges and share new and innovative ideas. This year, particularly, concerns were cited about the impact of Brexit and its influence on the market, together with more intricate security issues such as cybersecurity and data protection. It was really important for Traka to attend, not only to display its latest solutions and services but also to be part of these important conversations, so that together as an industry, we can pull together and have the solutions and answers ready. Q: Did you pick up on any particular trends at the show? One of the main themes of the show was the focus on smart security and integration Martin: One of the main themes of the show was the focus on smart security and integration. We are increasingly living in a far more connected and online environment, where the speed of data and the cause and effect on how to manage situations is becoming faster and simpler to instantly analyze a situation, with the necessary reports required available. From a security and data perspective, both on and offline, clients expect more, they do more research and they know what they are trying to achieve. They want to choose a partner that can provide integrated, all-encompassing bespoke solutions and achieve compliance as standard. It’s something Traka certainly has focused on to deliver bespoke solutions, integrated to suit a specific customer environment. Q: Was there a specific focus for Traka at Security Essen? Martin: For Traka, Security Essen was an opportunity to demonstrate how we can help businesses operate to minimize operational costs, increase productivity and ensure the efficient use of company assets. We demonstrated how our latest solutions can make sure every part of an organization is protected, right through to critical data facilities, an increasingly integral part of any security remit in today’s world. And due to the open nature of Security Essen, it was the perfect opportunity for Traka to discuss bespoke customer requirements across a number of different vertical sectors; from education to healthcare, hospitality to transport. Finally, Security Essen was the right international platform to present our proven integrated solutions. We wanted visitors to see for themselves how easy, intuitive and comprehensive our systems are, and with full audit capabilities, how they can present an all-encompassing safe and secure solution with tangible ROI benefits. Q: Could you tell us more about the products displayed at Security Essen? Our latest Traka Web central software management was at the heart of our display as an enterprise class web-based administration software platform Martin: At Security Essen, the range of products and services on show was focused on our core capability to secure, manage and audit the use of almost any physical asset, including: premises, devices, secure areas, data centers, equipment, machinery and vehicles. Our latest Traka Web central software management was at the heart of our display as an enterprise class web-based administration software platform, enabling complete management of Traka Touch key and locker systems from any device, even remotely. We presented live demonstrations of our integrated solutions, including our popular Rack Manager, which offers electronically controlled access to every server rack door in a data centre, with the ability to scale up to suit evolving infrastructure environments. We displayed Traka’s new V-Touch compact key management system, designed to offer controlled access management for critical keys at locations where space is limited and up to 5 keys need to be managed. Q: Could you tell us more about your integration capability? Martin: At Security Essen, we were lucky enough to be able to be able to demonstrate on our stand, Traka’s integration capability with Lenel and Nedap. We are extremely proud of our track record of integrating with third party systems with such leading companies. We believe it goes a long way to ease the burden of administration for our customers and present unique opportunities for controlling critical processes. Traka International and ASSA ABLOY exhibit solutions at Security Essen The Traka integration ‘engine’ ultimately allows for real-time, two-way communication with access control platforms, HR databases, time and attendance, and many other user systems. And there are a host of further benefits: The Traka integration ‘engine’ ultimately allows for real-time, two-way communication with access control platforms User profiles and access permissions can be easily populated and managed on an existing database. Automatically enrol users and define security settings based on employee status or department assignment Custom workflows can be tailored to the needs of an organization to generate actions, notifications or access restrictions based on the status of important assets ensure valuable assets and keys don’t leave site. Q: What are your aims on an International basis for Traka? Martin: Traka was the manufacturer of one of the first electronic key management systems – and we are now considered as world leaders in innovative technology for sophisticated, intelligent key and equipment management solutions to manage and control access to important assets. Even in such an industry leading position, recognized on a global basis, in the UK and in over 40 countries worldwide, we are far from complacent. We continue to evolve our solutions and professional services and continue to not only meet but exceed the requirements of our customers. This is not only from a product perspective, but also our service capability to offer advice right from initial design and specification stages to installation, project completion, handover and ongoing maintenance, across every sector. Naturally, we want to grow and evolve into more countries and increase our network of certified channel partners; but we can only do this if we continue to listen to the demands of the different market needs. Q: And what about Traka in the UK? We believe the transition to more intelligent systems, such as Traka solutions, will be more aligned with everyday life Martin: It’s surprising how many business and commercial owners still rely on manual processes and paper recording, for key and equipment management and control. Our aim is to prove how simple measures can make a difference. It’s not only the security of a business’ assets but also to reduce the cost to an organization through accidental damage, theft, personal injury and downtime. It also helps enforce business processes and ensure health and safety compliance. Ultimately, it’s a mindset. We believe the transition to more intelligent systems, such as Traka solutions, will be more aligned with everyday life. Q: How important is it to be part of ASSA ABLOY Group? Martin: Being part of the global leader in door opening solutions is a massive advantage for Traka. ASSA ABLOY’s products and solutions serve just about every conceivable application around the globe. The real credit to the group is its ability to understand Traka is a bit unique within ASSA ABLOY, because we provide different types of solutions to its traditional core. So, we’ve continued on as a separate business both in the UK and on a global basis, and only integrating where it makes absolute sense into the larger organization. An example of this is the integration between Traka and ASSA ABLOY’s advanced security CLIQ Web Manager software solution. The result is a key management process that is proven to significantly reduce maintenance costs and save administration times. Overall, it’s been impressive with the people and the technology within the company that we are able to tap into as and when required. The ASSA ABLOY solutions brand is one we are proud to be associated; a one-stop shop for all door and hardware opening needs. The ASSA ABLOY brand will continue to grow as a leader in opening solutions and access solutions. Q: What’s next for Traka? One of the key aspects we are focusing on is the move to present solutions dedicated to each market segments from small to global companies Martin: Traka is never one to stand still. We will continue to evolve as a company and invest in research and development. One of the key aspects we are focusing on is the move to present solutions dedicated to each market segments from small to global companies. By example, most recently in the UK, we have seen success in the launch of lockers specifically designed to store body worn camera technology, primarily for the likes of prison and emergency services but also in schools and community buildings. Not only did this require a solution to ensure the equipment is safely secured, but also that it is charged and instantly ready to use whilst in storage. At the same time any solution needed to help organizations, who had invested significantly in the technology, operate a ‘pool’ system rather than having to invest in a device per member of staff. This is just one example, with a very specific product requirement that Traka was able to work closely with the sector to understand the issues and create a solution. It demonstrates a commitment to design, in how our products operate and evolve to meet market needs, both in the UK and across international markets.
Plasco ID, global integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, he will focus on business operations and strategic initiatives. Physical Card Access Control A veteran in visual and physical card access control, Jeff formerly held the position of President at Bristol ID, global technology card business; prior, he served as General Manager for Brady’s People ID and IDenticard business units. This hiring directly correlates to Plasco ID’s customer-centric philosophy and strong commitment to customer service excellence. The secure ID solutions company continually leads industry innovation, with a mission to providing customers with the best solutions available to meet their unique business needs. Proximity Technology Cards Partnerships with the industry’s best manufacturers has resulted in exclusive printer offerings with unique benefits. In addition, the organization has launched its own brand of proximity technology cards, allowing it to pass along significant cost-savings to its customer base. Most notably, the organization developed the first subscription and cloud-based ID card management software, allowing an unlimited number of users to manage, design and print their card program from any location, any time. “We are pleased to welcome Jeff to the Plasco ID family. It is an exciting time for our organization as we add this new role to further bolster our senior executive team. Jeff brings a unique skill set that will enhance our ability to execute on both our strategic growth and improvement initiatives,” stated Alan Mendelson, Plasco ID President and CEO.
Matrix Comsec, a pioneer of technologically advanced security and communications solutions, is preparing to spread its footprints in the Canadian market. Security And Communication Solutions Matrix is renowned enterprise and each of their solutions are designed and manufactured in the company’s exclusive DSIR (Department of Scientific and Industrial Research) certified Research and Development Center. More than 40% of the company’s manpower is dedicated to the development of cutting-edge enterprise solutions. They also bear customer and market requirements in mind while designing our Security and Communication solutions to ensure that they turn out to be the perfect solution for modern enterprises. Additionally, we offer solutions that cater enterprises across various verticals such as Healthcare, Hospitality, Retail, Banking & Finance, and so on. Our solutions are carefully designed to meet individual requirements of each of these verticals’ market. IP Video Surveillance And Access Control Our range of solutions includes IP Video Surveillance, People Mobility Management and Access Control, Unified Communications and IP Endpoints Our range of solutions includes IP Video Surveillance, People Mobility Management - Time-Attendance and Access Control, Unified Communications and IP Endpoints. Matrix Comsec has successfully assisted leading brands to overcome their security and communication challenges with our proven and innovative solutions across diverse industries in the USA. We are aiming at having similar brand wins and earn customer loyalty in Canada as well. As part of our marketing strategy, we are going to penetrate the Canadian market and reach small & large enterprises of Canada with BTL marketing activities such as upcoming security and telecom exhibitions along with social and print media, etc. We see Canada as one of the potential countries to penetrate with our advanced solutions and make a mark among system integrators and end customers. We aim at becoming a name that believes in delivering substantial Security and Telecom products and solutions. Security Canada Central To further understand the Canadian market, we will also be participating in the Security Canada Central to be held on 24th - 25th Oct 2018. This event will serve as one of the greatest platforms for us to interact with the like-minded system integrators and project consultants of Canada sharing a similar vision like Matrix Comsec; i.e. to deliver world-class and advanced Surveillance, Access Control and Unified Communication solutions to modern enterprises. Interacting with the system integrators will give us greater insight into the enterprise demographics and challenges of the security and communications market in Canada, which will further assist us in understanding the niche requirements of enterprises in Canada and engineer solutions meeting their exact requirements. In our Managing Director, Ganesh Jivani’s words, “Matrix has a rich innovation lineage. The company has acquired a formidable reputation for quality and engineering of its products. Our solutions, with their value-added functionalities, will surely strengthen the communication and security requirements of enterprises. These solutions have already gained interest of system integrators and consultants offering technology solutions for small to large enterprises and projects. We look forward to a welcoming environment in Canada.”
Reading-based IT security company, VoiceVault Ltd. specializing in voice biometrics has entered administration after experiencing future funding issues. Its business and assets are now up for sale. Voice Biometrics Specialist Firm VoiceAuth - Complete Voice Biometric SaaS platform supporting both cloud and on-premise deployment Voicevault Limited entered administration on 8 October 2018, with Andrew Stephen McGill & Gilbert John Lemon of Smith & Williamson appointed joint administrators. The company has developed and operates a full suite of IT security products to include: VoiceAuth - Complete Voice Biometric SaaS platform supporting both cloud and on-premise deployment; VoiceSign – Custom IVR-based e-signature product designed for healthcare / insurance applications; VIM – Identity management system consisting of voice authorized password reset, out-of-bound authorization and time & attendance tracking; and ViGo – Mobile authentication system supporting iOS and Android The company has a portfolio of ongoing service contracts and worldwide patents and trademarks. Fulfilling Growth Aspirations Andrew McGill said, "The company has been historically funded by significant equity investment and now requires further working capital to move to the next stage of its development and fulfill its growth aspirations. Existing shareholders were unwilling to provide the future funding required without additional third-party investment, which was not forthcoming, and the director has taken steps to place the company into administration to protect the underlying business. We have retained the small team of three employees to maintain the platform and allow the business to continue operating while we seek interested parties to acquire the business and assets of the company.” He adds, "We have already identified a list of potential interested parties in the sector and we are directly approaching possible buyers, advertising on a business sale platform plus using word-of-mouth marketing through our contacts in the technology sector."
Security Essen 2018 presented itself as the international source of inspiration for the industry. 950 exhibitors from 43 countries showed their innovations for increased safety and convenience to over 36,000 trade visitors from 125 nations at Messe Essen on topics ranging from cyber security to innovations for building security and new solutions for the protection of valuables. The representatives of the companies, associations and institutions were in great demand as discussion partners. There was strong need for information and investment from trade visitors as a result of current events such as hacker attacks, challenges involving access control at airports, the still-high number of break-ins and increasing legal requirements. The exhibitors praised the significantly increased percentage of international visitors (eight percent up) and the strong decision-making authority of the trade visitors. Trend-Setting Solutions Security Essen attracted more than 36,000 professional visitors – including experts from industry and installers "Security Essen has underlined its position as a trend-setting international trade fair for all aspects of security. We were able to welcome significantly more visitors from abroad – 125 nations, that's an impressive number", says Oliver P. Kuhrt, CEO of Messe Essen. “Protection – whether public or private, digital or analog – is the central theme of our time. Our exhibitors provided answers to these challenges and presented trend-setting solutions. The high number of first-time exhibitors who showed their services to the specialist world indicates the importance of our trade fair as an independent platform for the security industry." There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID. The trade fair attracted more than 36,000 professional visitors – predominantly including experts from industry, installers and participants from the security sector – who were characterized by greater internationality, a significant interest in new products and new business contacts as well as a strong willingness to invest. There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID Numerous New Products Around 40 percent of the visitors came from abroad (2016: 32). The 76 percent of visitors were decision-makers within their companies and one quarter prepared their investments at the trade fair or concluded contracts directly. After all, the economy is still excellent. Industry sales in Germany alone are estimated at around 17.2 billion euros – a two-year increase of 18 percent. 62 percent of visitors rated the economic situation in the security sector as good to very good. Over 90 percent were satisfied with their visit to the fair and want to recommend Security Essen to others. The relevance of Security Essen as a pulse monitor for the security industry was particularly evident in the numerous new products. Once again, the influence of digitization became clear: access solutions are becoming smarter and rely on smartphones or biometric identification as keys. Evaluate Video Data Faster Protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures Artificial intelligence helps to evaluate video data faster and more accurately. Apps display unsecured windows in the smart home or help keep track of valuable contents of safes. The protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures. The winners of the Security Innovation Award attracted a great deal of attention. Seven exhibitors were honored with this award for their pioneering innovations. UrbanAlps convinced the jury with Stealth Key, a forgery-proof key from the 3D printer. The Jansen Tore burglar-proof sectional door with WK5 classification, which also received a prize, is especially secure – suitable, for example, for museums, hazardous material stores or military headquarters. Kötter Security received one of the coveted awards for the new emergency call and service control center, in which high-tech infrastructure and digital processes ensure the best possible customer security. New Service Facilities Security Essen was held for the first time in the modernized halls of Messe Essen, which will set new standards once the final construction phase is completed in 2019. Spacious, single-storey halls, plenty of daylight, the new glass entrance area and new service facilities such as the Business Club have already delighted exhibitors and visitors. Security Essen also provided optimal visitor and exhibitor communication with a new hall structure organized according to exhibition areas. The guests of Security Essen praised the division of the fair into key topics. The exhibition hall for Cyber Security and Economic Security celebrated a successful premiere. Exhibitors such as the Federal Office for Information Security, Telekom Security, Advancis Software & Services GmbH and the newly founded Federal Association for Critical Infrastructure Protection (BSKI) presented here. Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value Thematically Suitable Exhibitors Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value. Thus on the ‘Day of training and further education’, which was organized by the Federal Association of the Security Industry (BDSW) and Messe Essen, 300 participants of the security industry were provided with information on training possibilities and career opportunities. At the new Cyber Security Conference, Arne Schönbohm, President of the Federal Office for Information Security, spoke about cyber security as a challenge for politics, business and society. The computer scientist Jan Krissler, known as Starbug, was also a guest at the top-class conference. Gregor Gysi, member of the Bundestag of the German party ‘Die Linke’, discussed the economic importance of cash at the BMWL (Federal Association of Medium-Sized Value Logistics Companies) booth. In the security experts’ forum, practical experts designed a non-stop programme with more than 90 presentations. The guided tours were expressly aimed at architects, planners, installers, operators, authorities and employees of construction and planning departments and stopped at thematically suitable exhibitors. Topic Of DigitizationCooperation between Western Business Exhibitions and Messe Essen offers a comprehensive platform for business The organizers are already setting the course for the next Security Essen, which will take place at Messe Essen from 22 to 25 September 2020. The new thematic hall structure will be further expanded and the topic of digitization will be explored in greater depth. Numerous exhibitors have already confirmed their registration for the next event. 88 percent of the visitors have already stated their intention to participate in Security Essen 2020. The fair is also taking a further step towards internationalization: From 9 to 11 April 2019 ‘The Security Event - powered by Security Essen’ will take place for the first time in Birmingham, Great Britain. This cooperation between the British trade fair organizer Western Business Exhibitions and Messe Essen offers the European security industry a comprehensive platform for business in Great Britain. Over one hundred of the world's leading security brands are exhibiting. Excellent Platform 950 exhibitors from 43 nations presented innovations in the field of civil security at Messe Essen. The projection for the last day of the fair estimated 36,000 visitors from 125 nations including conference participants, VIP guests, delegation participants and journalists (including FKM projection of 33.000). The proportion of professional visitors was 99 percent. The hall distribution was particularly great success this year Andreas Straubinger, Region Manager D/A/CH, Vanderbilt International GmbH said, “Our stand position in the new Hall 6 was a very good choice. Visitor footfall was above average and the results were even better than we saw at the last Security 2016 trade fair. We thought the hall distribution was a particularly great success this year. The number and quality of our D/A/CH trade fair contacts were very good; not only this but we were delighted to see how many trade fair visitors attended from around the world, which was a great fit for Vanderbilt’s global orientation. The trade fair contributed to further developing the level of awareness of the Vanderbilt brand. We consider Security to be the leading trade fair for our industry. It is an excellent platform from which to present our solutions to a broad audience.” Extremely Well Informed Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products" Bernd Hohlfeld, Management Board, ALVARA Cash Management Group AG commented, “For us, Security Essen has been our most successful trade fair to date. The high levels of demand for our ALVARA Logistic App and ‘Digital Driver Legitimation’ were one reason, but not the only reason by any means. In particular, the BMWL joint stand brought together all of the stakeholders in cash services, offering an overall solution for efficient cash circulation. The joint stand was well placed not only to present the route to innovation but also to confirm it. The concept is very impressive and we will be back in 2020.” Knud Brandis, Managing Director of PwC Cyber Security Services GmbH said, “PwC Cyber Security Services GmbH is Germany’s leading consultancy firm for data security. As Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products and services here. The topics which were in particularly high demand were information security, data protection, emergency services and cyber security. The trade visitors were extremely well informed and precisely our target audience.” Invaluable Validation Stamp Sebastian Mosbacher, Managing Director, Stölting Service Group commented, “Stölting Security was extremely satisfied with Security Essen 2018 in Essen. As a large security services provider operating in Germany, we were able to present our services and position ourselves in the best possible manner. The second day saw high footfall and was of great significance for us as a trans-regional personnel service provider operating in the sector of cleaning, security and staffing. Stölting Service Group will be back in 2020!” Dr. Alejandro Ojeda, CEO and Founder of UrbanAlps AG said, “Security Essen was beyond our wildest expectations; it has been one of our best platforms to get in direct contact with our target audience at an international level. Furthermore, winning the Security Innovation Award 2018 for our core product the Stealth Key, the worlds’ first 3D metal printed key, has been an invaluable validation stamp from arguably the world’s leading security fair. It is clearly the place to be for security and we eagerly look forward to come back once again in 2020.” Topics discussed at Security Essen were information security, data protection, emergency services and cyber security Convenient Contactless Handles Rainer Schratz, Marketing Manager, HOPPE AG, Stadtallendorf commented, “HOPPE presented at Security Essen for the first time this year – and so far, we are extremely satisfied with the results of the trade fair. Security Essen is a good platform for HOPPE innovations and expertise in the field of protection and amenities; this is also clear from the high number of contacts we made at the trade fair – both with customers as well as visitors who came from segments which are new to us, for example from the electrical wholesale trade.” “Of course, the quality of the new contacts can only be evaluated after the trade fair but we are delighted with the high level of interest shown by visitors in our products – both from trade visitors and from the media. Visitors were particularly appreciative of our innovations such as the burglar-proof window handles SecuForte with automatic locking function and convenient contactless front door handles or the wireless window handle offering central locking.” Diverse Possibilities Offered Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention" Norbert Schaaf, Chairman of the Federal Association of Security Technology (BHE) and Chairman of the Advisory Board for Security Essen said, “Trade fair visitors from around the world were able to seek information about the diverse possibilities offered by modern security technology from around 950 exhibitors. The new layout, with six primary areas, also received very positive feedback. The profile of the Security trade fair offers the right background for the entire security industry.” “As a specialist trade fair, it specializes in security and therefore offers the ideal platform for providers and users to share information and views. Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention. The innovative spirit of the security providers also became particularly clear at the presentation ceremony of the Security Innovation Awards 2018.” Secured Connectivity Platform Serge Coppens d'Eeckenbrugge, Regional Manager BNL - DACH, Managing Director DACH, UTC Fire & Security commented, “Smart buildings and smart homes were the focal point of this year’s Security Essen. Thanks to UltraSync, the new secured connectivity platform, integrated smart home or smart building security solutions can be managed using the internet. UTC Fire & Security presented their Lenel range, which offers various security technologies (video, access, fire and burglary), which are integrated into both the home and larger-scale environments in a user-friendly manner.” “The trade fair offered us the ideal platform to present our upcoming new product range of cable and wireless fire alarm systems. The feedback we received from both the domestic market and neighboring countries was outstanding. The relaxed stand design provided the perfect environment for intense yet enjoyable conversations. Security Essen was very successful for us and we are looking forward to taking part again.” The relaxed stand design provided the perfect environment for intense yet enjoyable conversations Digital Burglary Protection Dr. Florian Scharr, Press Spokesman, VdS Schadenverhütung GmbH said, “Our goals were surpassed at Security Essen. At times, our stand was besieged! The burglar protection was particularly important and the topic of digital burglary protection was in high demand, which was very pleasing. We are delighted that so many industry representatives as well as numerous installers and planners came to find out more about VdS. Security Essen is a very important trade fair for us.” For the first time, the three security associations -BDGW, BDSW and BDLS – presented themselves together at Security Essen" Dr. Harald Olschok, Managing Director, BDSW Bundesverband der Sicherheitswirtschaft commented, “Once again we can look back on a successful trade fair week. For the first time, the three security associations – Federal Association of German Money and Value Services (BDGW), Association of private security industry (BDSW) and Federal Association of Aviation Security Companies (BDLS) – presented themselves together at Security Essen.” Buy Something Specific “The expert visitors and interested guests were informed about the work of the security associations through various events and lectures in the trade fair forums. Alone on the ‘Day of training and further education’, which takes place in cooperation with Messe Essen, around 300 visitors again took part.” Friederike Nielsen, VP of Marketing, Dedrone GmbH said, “Two years ago, our subject area ‘protection from civil drones’ was still very new. Even then, we made a great deal of interesting contacts with German and international customers and partners at Security Essen. Since then, our market has seen a great deal of additional growth. A great deal of visitors has come to our stand with a specific intention – many of them have an intention to buy something specific. We are leaving the trade fair very satisfied and will definitely be back.”
Matrix Comsec is to participate in the NPPC (National Public Procurement Conclave) 2018 to be held in New Delhi from 30th to 31st October 2018. Matrix will be exhibiting their communication and security solutions along with other enterprise grade solutions. IP Solutions For Modern Enterprises From the Telecom domain, Matrix will be exhibiting the newly launched pure IP solutions for modern enterprises - PRASAR UCS and the smart video IP deskphone - SPARSH VP710 at the event. The company will also be exhibiting SARVAM UCS and Media Gateways. Solution experts for Matrix’s people mobility management solutions will be demonstrating the Aadhaar enabled biometric attendance system at the event. They will also be giving a brief on the well-engineered access control solutions to be displayed at the event. Company experts are to exhibit COSEC Panel Lite standalone access control solution, which is a site controller that implements advanced access control features and restricts unauthorized entry. Video Surveillance Solutions Matrix will also be discussing COSEC ARC - an I/O Controller which provides the flexibility to control and monitor a range of hardware devices that are integrated with the controller. Additionally, Matrix will be displaying the COSEC PATH series door controllers, which are fingerprint and RFID card-based devices. From the video surveillance domain, solution experts will be talking on the recently launched Extreme series of Network Video Recorders. These recorders are equipped with features like cascading, H.265 compression, 4K decoding, RAID 5, 10 support, high storage, and 512Mbps throughput. Matrix will also be exhibiting IP cameras that are furnished with Intelligent video analytics that enhance security of enterprises. Learn more about Matrix solutions by talking to company's solution experts at the NPPC (National Public Procurement Conclave) 2018 event, Stand No. 43-44 from 30th to 31st October 2018.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security And Privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximize the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security Industry Role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetized, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High End Sees Growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralized control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market Threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Workplace mobility is on the rise, which means organizations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situations. One of the major worries for an organization is the safety of its employees, whether they’re on-site, at a different office location, on-the-road, in the field or in the air. When disaster strikes, organizations need to quickly communicate with their employees in case of a location-based event (active shooter, fire, explosion, natural disaster or terrorist attack) to help protect their safety and direct them to take specific actions. For example, if there are angry protesters in the same area an employee is traveling, it is important to be able to notify that person to keep them out of harm’s way. Employer Duty Of Care This leaves companies with a tough task – do you know where your people are at all times? How can employers fulfill their Duty of Care and ensure employees are safe in times of crisis, no matter where they are located? This is easier said than done. According to Ernst & Young’s latest Global Mobility Effectiveness Survey, only 30 percent of companies have a system in place for tracking business travellers. In addition, contractors, visitors and vendors are difficult to reach and account for when traveling in and around your facilities. But, with the help of timely location data collected from building access control systems, wifi access points, travel management systems and more, safety-conscious organizations can automatically keep employee locations current – even when employees are traveling or moving between buildings and campuses. In such instances, organizations can improve security preparedness and employee safety by harnessing location-based technologies that help them ensure they can send the right message at the right time. The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Dynamic location tracking and alerting has huge potential for safeguarding the well-being of mobile workers. Many organizations have started to integrate critical communication solutions with physical security systems to rapidly identify, communicate with and account for employees during these disruptive events. Everything from modest access control systems to sophisticated biometric systems can track specific employee movements When implementing location-aware alerting systems, it’s important for organizations to keep the following best practices in mind: Aggregate Location Data Across Multiple Systems The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously – meaning employee locations (or, at the very least, last known locations) can be automatically acquired. Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication for rostering, mustering and site evacuation purposes at the moment emergencies occur. Merge Travel Risk Management With Location Alerting But what about when someone is working remotely or traveling? Corporate travel management tools, and travel security services companies like International SOS, provide specific travel details and itineraries for individual employees – so you know where they’re traveling to, how they’re getting there (airplane, bus, train), as well as where they’ll be staying once they get there. Data doesn’t exist in a silo, so a good location alerting system will aggregate and store data from as many sources as possible. This enables organizations to locate and communicate with staff during global events and emergencies and help determine if they are safe or need assistance – no matter where they are. Again, this helps you meet your Duty of Care to keep your team safe at all times. Ensure Employee And Building Databases Are Accurate Location-based notification systems, from badging systems to Wi-Fi access points, need quality data that is up-to-date and accurate in order to effectively reach an organization’s employee base. Traditional methods of importing data, including importing spreadsheets and call lists, just won’t cut it. While these sources important contact path information like landline numbers and addresses, they clearly lack the many other contact paths that employees will be most likely to notice right away while traveling, such as cellphones and email. Collecting correct and relevant contact data, such as personal or BYOD phones, can ensure that messages are received and responded to by relevant employees. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees Automate Communication And Collaboration Once location data is gathered and stored, it must be connected to an incident communications solution that can instantaneously distribute targeted alerts in the case of an emergency. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees. When a location-based emergency occurs, the systems that can send messages to a targeted geographic region – whether that is a specific building, floor, neighborhood or zip code – instead of the entire employee directory, will be the most effective in ensuring the right messages are sent to the right people. Additionally, if recipients can acknowledge that a message was received, it allows organizations to identify who is safe – and who may still be in harm’s way and needs help. Every Minute Counts Let’s say a fire breaks out in a corporate building on the fifth floor and an emergency alert is sent out to all employees in the building. You know that three employees used their security badges to swipe in to that floor earlier that afternoon, but only one responded to your emergency alert. Because you have enabled two-way communications and expect responses from employees that are safe and unharmed, you now know that there is a very real possibility that the other two employees are incapacitated and could be in immediate danger. Building upon this idea, systems that enable employees to initiate communications are much more impactful in protecting their safety in location-based emergencies. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organization’s security team – automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button. During critical events, man-made incidents or natural disasters, the ability to identify and reach employees with reliable, automated communications that harness geo-intelligent tools can not only protect your business assets, but can be the difference between life and death for your staff. Because every minute counts, you can’t afford to waste time searching spreadsheets, directories and schedules to notify your employees. Automated communications that utilize available location data enable organizations to connect with employees more effectively, helping to ensure their safety during critical events worldwide.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behavior and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analyzing Body Recognition Factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognizing the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analyzed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognized. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behavior and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognize people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorized to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kickoff ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kickoff this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrolls in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorized access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher Single Access Card Control System Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Center Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Center central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast Facts About The Project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilized: Command Center Controller 6000 T-Series readers Tag Boards Car park Management
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy Attendance Management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis Of Employees’ Attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralized Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Bluffton Self Help, a non-profit organization providing food, clothing and financial assistance to low-income residents of Bluffton, S.C., has gone high tech with an Iris ID iris recognition system tracking the hours of paid staff and volunteers. An Iris ID iCAM R100 camera replaces mag stripe cards, said Tony O’Brien, president of Sourcecode LLC, a South Carolina-based software development firm. He designed the iris system, as well as a computer network and telephone system for Bluffton Self Help. Saving The Cost Of Purchasing ID Cards “When I started working with the group it was still using sign-in sheets for its patrons to receive benefits,” he said. “I helped move them to a swipe card system about seven years ago. Then last summer I suggested to the executive director we could use iris identification to eliminate the cards.” The iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cardsAccording to O’Brien, the iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cards for the five paid staff members and more than 250 volunteers who regularly use the system. The Iris ID system paid for itself in about five months, O’Brien said. After staff inputs a new volunteer’s data, it takes seconds to enroll the person in the system. The person stands in front of a camera which takes a picture of both eyes (irises). Software turns the photo into a digital template stored on the organization’s computers network. The same camera is later used to identify volunteers arrive and leave in a process that takes less than two seconds. Monitoring Volunteers’ Working Hours Kimberly Hall, executive director, Bluffton Self Help, said the volunteers, many of them senior citizens, tell her the system is easy and fun to use. “Our volunteers love it,” she said. “And with the touch of a button on our computer we can see how many hours our volunteers have worked.” With the touch of a button on our computer we can see how many hours our volunteers have worked"Hall estimated volunteers annually provide about $1.2 million worth of services. That’s important to know when the privately funded group seeks contributions from donors who often want to make sure the organization has the manpower to ensure those in need are receiving services. Hall said patrons still use the swipe card system as many are undocumented residents and fearful of new technologies. She hopes education will change that as Iris ID’s stored digital templates cannot be reconstructed to identify a person. Accurate And Easy To Use Systems Mohammed Murad, vice president global sales and business development, Iris ID, said the Bluffton Self Help system shows how iris recognition technology is appropriate for virtually any organization needing identity verification for security or time and attendance. “Systems from Iris ID are affordable, accurate and easy to use,” he said. “They’re no longer just for government organizations or Fortune 500 companies. The company is excited to be a technology provider to many non-profit organizations around the world.”
It began with a desire to help students fit in. Officials in Maine School Administrative District (MSAD) 58 introduced uniform bar-coded plastic ID cards to replace their existing color-coded punch cards so that students eligible for free lunches would not easily be identified by their friends. “In the past, students used punch cards to buy their lunches,” said Angel Allen, Technology Director for both MSAD 58 and neighboring district, MSAD 9. “The different colors identified their economic status for other students to see. It was not a good thing.” Some students chose not to eat rather than be embarrassed by the color of their card. The issue is a significant one. Between 40 and 60 percent of students in MSAD 58 qualify for a reduced lunch program, according to Allen. The district, which sits in a rural area of Franklin County, Maine, covers 500 square miles and serves 1,000 students through five schools. Using ID cards was not new to the Maine school administrators. Sister district, MSAD 9, had been using ID cards as visual identity for its staff for a long time, according to Allen, but “the old system was a beast.” Direct-to-Card Printer/Encoder MSAD 58 began using ID cards printed on a new Fargo DTC300 Direct-to-Card Printer/Encoder for the hot lunch program in the fall of 2005, with the lunch director printing the cards. A second printer was purchased in 2006 and is operating out of the superintendent’s office to create staff ID and lunch cards. MSAD 58 continues to expand its use of ID cards: It created a debit system in which parents can apply money to the card so their children can charge against it rather than carrying money to school. ID cards without photos are used for substitute teachers, volunteers and parents who enter the schools. Students and faculty can check out library materials using their ID cards. Students without drivers’ licenses have even used their school ID cards for identification on school trips. In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9 Building access solutions “We also use the ID cards as medical emergency cards,” said Allen. “They are particularly useful on field trips to identify students with allergies, diabetes or asthma and to provide emergency contact numbers.” In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9. The district is printing RFID cards for staff ID and building access. There is also a DTC300 for the student lunch program. “My experience in MSAD 58 introduced me to Fargo,” said Allen. MSAD 9 includes nine schools and serves 2,500 students. Here, the ability to print on two sides of a card was important, as administrators wanted a bar code on the back to work with the district’s time card system and door access program. In addition, the district is initiating a new lunch program, and a library program is in the works. Software integration “In MSAD 58, we began printing small, key chain ID cards from perforated card stock,” said Allen. “Each includes the student’s name and a bar code. Being able to carry their ID card on a key chain helps prevent students from losing their cards.” Nevertheless, a $1 replacement fee is charged each lost card, although the fee was never meant to build revenue. “It’s just enough to aggravate the students,” Allen said. TAll students carry the same plastic ID card. Information on their lunch status is contained in a bar code on the back of the card. “Now, everyone has the same card,” said Allen. “The bar code number is scanned into the cafeteria software, and only the computer can distinguish who is eligible for a reduced lunch from those who are not.” Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners Student ID cards “The big thing with schools is technology,” said Jennifer Clancy, ID Wholesaler Marketing Manager (www.idwholesaler.com), who sold Allen the printers. “In Angel’s case, she is creating a system where the student ID is a stored-value card for the lunch program using a bar code. Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners. Schools nationwide are instituting policies where a visible ID is required of students, faculty and staff at all times. With a visible ID, there is no excuse for a person to be somewhere he or she is not supposed to be. Individuals can be better identified and dealt with by the existing school protocols.” Requirements for the ID cards differ between high school and elementary school students. High school students are required to carry their ID cards at all times. In the elementary schools, students grab their ID cards from a rack on the wall outside the lunch room each day before lunch. Cards are scanned by the cashier and put back in a basket, so someone can replace them in the rack after lunch. “Younger kids can’t be responsible for remembering to bring their card every day,” Allen said. School security system Employees, especially those with multi-school assignments, such as administrators, supervisors, plant operations, maintenance, food service and transportation personnel are required to display their identification card at all times when performing duties for the school system. “Schools that have a student photo ID program in place are starting to expand the use of the cards to applications such as library checkout, lunch program management, equipment checkout, access to computers, student activity passes and bus access,” said Clancy. “More advanced schools are moving to cashless vending, lunchroom use or activity attendance.” Allen, who is responsible for the technology in both MSAD 58 and MSAD 9, envisions expansion of the ID card program, especially the RFID technology component for access control. “We try things in one place and then take them beyond,” she said. “That’s the cooperative nature of our districts.” But for now, simply using ID cards to help students fit in during lunch is a huge step forward.
Varsity Management is an innovative education system focused on learning and leadership. Varsity offers well-designed courses plans that are in sync with the state and national board curricula. Based on the re-engineered learning patterns, these plans help teachers provide multisensory learning and develop social and thinking skills in students. Varsity Management is empowering 3,85,000+ students annually with its presence across 465+ schools, PAN India. Recording Accurate Attendance Data The main requirement of the organization was to bring its time-attendance under the same network umbrella. Varsity Management Pvt Ltd wanted to manage time-attendance of more than 15,000 employees at 100+ locations across India. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records of the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of staff members. They required a biometric hardware solution that could precisely capture employees’ attendance. Moreover, they needed instant SMS notifications for certain events like missing in/out punch, attendance summary, etc. Matrix meticulously studied the needs of Varsity Management along with its regional partner Vigilant Technologies Time-Attendance Management Solution Matrix meticulously studied the needs of the institute along with its regional partner Vigilant Technologies. Having discussed in depth with Varsity’s team, Matrix offered its comprehensive Time-Attendance solution for managing and tracking staff movement from a single place. Matrix has installed 130 COSEC DOOR FOT V3 biometric time-attendance terminals at 100 locations across India. HR/Admin could easily track attendance of all employees and generate different types of reports for timely salary payment. Now users are updated instantly on different events like missing in/out punch, attendance summary, etc. when it occurs. Benefits of Biometric Time-Attendance Terminal Centralized Monitoring and Control Efficient Time-Attendance Management Quick and Easy Salary Calculations Improved Productivity Customized Reports
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?