Biometric Security
Fugue, the company putting engineers in command of cloud security and compliance, announces new capabilities for bringing public cloud container resources into compliance and ensuring the continuous security of container runtime configurations. The new capabilities deliver security and compliance visibility and reporting for managed container services offered by Amazon Web Services and Microsoft Azure and turnkey support for the CIS Docker Benchmark. The new Fugue features provide continuous co...
The need for safer and more touchless ways to pay has escalated and consumers are embracing contactless cards as the preferred means of payment, with 77% using them regularly in-store. However, in parallel with the increased use of contactless are rising security and usability concerns. The pandemic has rapidly changed the way one pays and their attitudes towards how they want to pay in the future. “PIN codes have been annoying for a long time, but who would have thought a year ago that o...
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announces enhanced integrations and business offerings in its OneView management dashboard to streamline security business operations for Managed Service Provider (MSP) partners. The latest expansion brings management of server products into the cloud console and also integrates directly with ConnectWise Manage business management solution, making it easier for MSPs to streamline billing, service ticketing, and...
Ensuring the safety of residents and staff in specialized housing environments has always been a priority for those in the sector. Karen Trigg of Allegion UK highlights the steps decision-makers must make to keep occupants in sheltered, extra care or supported housing safe and secure. Whether it’s adhering to fire safety or infection control guidelines, a topic that is never far from ones thoughts at the moment, there are many options that decision-makers can take to ensure maximum safety...
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services.&n...
News
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27”, and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points, or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity to display a slide show which can include supplier adverts, own-brand product promotions, and special offers. A default blinking recording in progress message is superimposed over the displayed graphics to let would be thieves know they are on camera, with operators having the option to customize the message and configure its size, color, opaqueness and positioning on the monitor. Face detection Face and motion detection feature can be configured to switch the display to live view to make people aware they are being watched Supported by the Wisenet WAVE and SSM video management platforms as well as Wisenet NVRs, the ONVIF Conformant PVMs can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so by built-in face or motion detection video analytics. The face and motion detection feature can also be configured to switch the display to live view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds. The PVMs, which can be integrated with tagging (EAS) systems to record images of people who might be leaving the store with stolen items, also provide support for the AI-Masking, AI-Bio, AI-Face-Detect, and AI-Occupancy video analytics applications, developed by Hanwha Techwin’s technology partner, A.I. Tech. Video evidence Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the PVMs will continuously stream images to a control room where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR. The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear, sharp images in strongly contrasting light conditions at, for example, store entrances where strong sunlight may be streaming in. Power over Ethernet All three PVMs can be powered by 12V DC, with the Wisenet SMT-1030PV also offering the option to utilize Power over Ethernet (PoE+) if there isn’t an existing power supply close to where the PVM is being installed. A single cable of up to 100m is all that is needed to provide both powers to the SMT-1030PV and for network communications. The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows: SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution. SMT-2730PV: 27” monitor with LED backlight, HDMI input, and Full HD display. SMT-3230PV: 32” monitor with LED backlight, HDMI input, and Full HD display. Loss prevention strategy “With retailers increasingly relying on PVMs to play an important role within their strategic approach to loss prevention, we have designed our new models to make it quick and easy, as well as cost-effective, to deploy them across a large number of stores,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “As the only PVMs available which, for cyber security and data protection purposes, are supplied with a complete built-in SSL connected camera, they eliminate the need for system integrators to install and connect a separate supporting camera, which some other manufacturers’ PVMs require." "By building in an intuitive user interface, we have also made it extremely easy for busy store managers to take full advantage of the PVM’s functionality, including the ability to utilize the monitor for advertisement and signage using the slide show mode.”
Johnson Controls, a provider of smart, healthy and sustainable buildings, announces results of independent surveys of 800+ building decision makers showing a clear shift to increased investment in healthy building trends and technologies. “At the center of a vision for a healthy world must be healthy buildings, and that means delivering on the most critical elements to serve People, Places and Planet,” said George Oliver, CEO of Johnson Controls. Game-Changing solutions “Our OpenBlue technologies reinvent the building landscape, creating dynamic smart facilities that help businesses meet their sustainability commitments, while delivering healthy places, enriched experiences and cost savings. Johnson Controls leads the industry in translating new building technology capabilities into game-changing solutions that deliver on our focus of People, Places and Planet.” As a pioneer in the category with 135 years of experience, Johnson Controls is ideally positioned with technologies and solutions that accelerate the reinvention of healthy buildings. The surveys confirmed the need is greater than ever, with 90 percent of responding firms having dedicated resources to healthy buildings initiatives. Reducing energy use Johnson Controls OpenBlue technologies deliver a unique, game-changing capability to solve for healthy places" “Building owners are struggling to balance urgent and conflicting priorities between employee health and wellness with critically needed cost savings, increased revenue and sustainability targets,” said Michael Ellis, executive vice president and chief customer & digital officer at Johnson Controls. “Johnson Controls is best positioned to help businesses meet those sustainability commitments while delivering on our customers’ return on investment,” Ellis said. The 2020 pandemic showed that few customers were able to reduce building operating costs despite lower occupancy, highlighting the need for technologies to deliver flexibility. “Energy use should be dramatically lower when occupancy is low, but surprisingly less than one in ten building operators were able to reduce energy use more than 20 percent,” Ellis said. “At a time when companies are aggressively pursuing energy and cost savings, customers need and want solutions that help them do better, while increasing the health profile of those buildings. Johnson Controls OpenBlue technologies deliver a unique, game-changing capability to solve for healthy places, while simultaneously serving sustainability goals.” Specific investment priorities The survey of facilities operators showed a range of specific investment priorities to meet goals for Healthy People, Healthy Places and a Healthy Planet: Healthy People - Businesses are increasingly committed to employee health and wellness as a driver of high performing teams. The studies show an increase in investments by organizations toward wellness, clean air and peace of mind. 80 percent of respondents stated that protecting the health and safety of building occupants during the COVID pandemic and afterward is very or extremely important. New factors are being included in this mix such as temperature control, disinfection, ventilation and air filtration which all require well maintained systems and equipment, enhanced through intelligent sensors and control software. The realities of the COVID pandemic have increased the potential benefit of these technologies and for contactless access and contact tracing. These capabilities can help increase overall building security through enhanced tracking of building guest and occupant access, flow and location, while maintaining trust. Johnson Controls delivers solutions for all of these needs and in support of broader wellness for people in shared spaces. Flexible facility monitoring Finding cost savings and making fast and informed decisions is a critical part of facility operations Healthy Places - Finding cost savings and making fast and informed decisions, supported by data, is a critical part of facility operations. In the Johnson Controls independent studies, 80 percent of facility executives stated that increasing flexibility to quickly respond to emergencies is a top driver for investment in technologies such as flexible facility monitoring and healthy air strategies. The spaces in which people work, shop, entertain and live become more inviting, more efficient and less expensive to operate over time. Space optimization, capital planning and increasing the uptime and lifetime of assets all support operational performance and lead to cost savings & increased revenue opportunities for building operators. Johnson Controls OpenBlue, a complete suite of connected solutions and services, leverages digital integration to optimize the performance of buildings and assets. Smart building technology Healthy Planet - Improvements in energy efficiency, renewable energy and smart building technology are becoming more critical each year. In the studies, 76 percent of facility executives stated that energy cost savings are a top driver for investment. These investments also influence corporate sustainability rankings, an important metric for attracting and retaining investors, employees and customers. Buildings are responsible for about 40 percent of the planet’s total energy consumption Buildings are responsible for about 40 percent of the planet’s total energy consumption and 36 percent of greenhouse gas emissions from energy use. But only 1 percent of buildings undergo energy efficient renovation every year. Effective action is crucial in aligning to increased regulation, decreasing energy consumption and increasing sustainability. For the health of the planet, the studies revealed that 57 percent of organizations plan to achieve net zero carbon or positive energy status in at least one facility in the next ten years. Energy-Savings performance Through ongoing efforts to create more healthy buildings, Johnson Controls has implemented more than 3,000 energy-savings performance contracting projects in North America alone. The result has been reductions of more than 29 million metric tons of carbon emissions from customer facilities and savings of $6B in energy and operating costs driven by a comprehensive suite of product and technology solutions. In fiscal year 2019 almost half of Johnson Controls revenue came from products and services that reduce energy use and improve sustainability. Johnson Controls helps building owners and occupants make efficient, productive decisions in support of healthy people, healthy places and a healthy planet.
Green Hills Software, the pioneer in embedded safety and security, announces the release of µ-visor™, its safe and secure embedded virtualization hypervisor, for the Renesas RH850/U2A microcontroller (MCU). Designed to support the emerging automotive cybersecurity requirements of ISO/SAE 21434 and UNECE WP.29 and to meet ISO 26262 ASIL D functional safety, µ-visor for MCUs expands Green Hills leadership in safe and secure virtualization technology and its product line. µ-visor joins the proven, broadly deployed INTEGRITY Multivisor® virtualization for application processors already used in tens of millions of commercial vehicles worldwide. Multiple virtual machines µ-visor is the basis for safe and secure consolidation of multiple MCU-based systems onto a single multicore RH850/U2A design, enabling savings in cost, size, and power for the resulting consolidated system, while at the same time simplifying the safety design of the system. µ-visor allows multiple virtual machines to run simultaneously, supporting a variety of scheduling By employing the advanced hardware-based assisted virtualization capabilities of Renesas’ RH850/U2A, µ-visor allows multiple virtual machines to run simultaneously, supporting a variety of scheduling and core management strategies to meet various automotive uses cases and to ensure extremely low overhead. The Green Hills MULTI® integrated development environment (IDE) and related ISO 26262 ASIL D-certified tools provide developers with tightly integrated tools that deliver unprecedented visibility into system performance and runtime behavior, enabling rapid integration and optimization of multiple workloads onto a single RH850/U2A MCU. Hardware virtualization function µ-visor can host a variety of operating systems, including AUTOSAR environments from third-party vendors, Green Hills Software’s own µ-velOSity™ operating system, customer in-house operating systems, or micro-executive designs, giving customers a great deal of flexibility on how to design consolidation for their automotive controller use cases, including support for ECU safety islands. The Renesas RH850/U2A is the world’s first MCU with embedded flash that integrates a hardware-based virtualization-assisted function while maintaining the fast, real-time performance that customers expect of the RH850 products. The hardware virtualization function supports ISO 26262 ASIL D functional safety, enabling greater levels of system integration of the safety applications of automotive OEMs and Tier 1s into a single, unified MCU-based electronic control unit (ECU). Multiple software services µ-visor from Green Hills Software fully supports all of these advanced capabilities To support ASIL D, the hardware-based virtualization technology allows customers to implement multiple software services with different functional safety levels on the RH850/U2A MCU that can run concurrently without interference while maintaining the hard real-time deterministic performance required to control modern and future vehicle functions. µ-visor from Green Hills Software fully supports all of these advanced capabilities. “Renesas and Green Hills have been working together for decades to provide the best functional safety solutions for Renesas MCUs for our mutual customers,” said Naoki Yoshida, Vice President of Automotive Digital Products Marketing Division at Renesas. Challenging consolidation requirements “Renesas RH850/U2A’s hardware-based virtualization assisted technology and Green Hills Software’s extensive experience with virtualization and Renesas’ products is a natural combination. We’ve worked together to address our customers’ most challenging consolidation requirements, and µ-visor enables the full utilization of the advanced capabilities of our latest MCUs.” “Green Hills Software’s virtualization technology for application processors is already in production in tens of millions of vehicles today,” said Matthew Slager, Vice President of Asia-Pacific Operations at Green Hills Software. “By extending our virtualization technology expertise and experience into the MCU market with µ-visor and working with Renesas, Green Hills Software can offer best-in-class performance, functional safety and cybersecurity on the RH850/U2A, allowing automotive customers to achieve the challenging goals of developing and deploying highly performant and entirely safe and secure ECU consolidation.”
ComNet, Communication Networks of Danbury, Connecticut, an ACRE company, and a USA-based manufacturer of fiber optic transmission and networking equipment, is expanding the line of Cybersecurity products by adding to its line of intelligent media converters. These intelligent media converters with Link Guardian create a physical layer of protection that limits network traffic to one-way communication between the source and destination networks. The ComNet CNGEUMC4+2(TX, RX)/M is designed to prevent cybersecurity attacks by limiting data flow to one direction between a secured and unsecured network. External cyber threats How the devices are deployed will determine which direction the data will flow. Called a ‘Unidirectional Media Converter’, this physical security is more effective than software-enabled network firewalls. This data connection is un-hackable and invulnerable to malware. The ComNet CNGEMUMC4+2(TX, RX)/M is a hardened four-port all-gigabit intelligent Media Converter. This product is designed to provide deterministic data transfer in only one direction (unidirectional), to segment and protect networks, devices, and other digital assets (databases, historians, SCADA, PLCs, DCS, etc.) from external cyber threats. Distance extending device The primary purpose is as a distance extending device, but they can also be used as an entry point to a network" It has four 10/100/1000Base-T(X) copper ports and two 1000Base-FX SFP ports. It effectively only allows data to travel in one direction. The CNGEMUMC4+2(TX, RX)/M provides exclusive functionality for easy field deployment including DIP switch-based operation of RSFP (redundant SFP) for creating redundant fiber connections. According to Andrew Acquarulo Jr., ComNet CEO and President, “Media converters are generally simple to use. The primary purpose is as a distance extending device, but they can also be used as an entry point to a network. By adding features such as Link Guardian, we are offering our customers another way of making their network more reliable and secure from unauthorized access. This keeps us front and center in terms of innovation.” More competitive position The company believes that these features give them a more competitive position in the market and allows ComNet to be unique and differentiate the product line. “Making any network operate more efficiently and effectively is another way of how ComNet moves the market. Cybersecurity/ unauthorized access is a monumental concern for all security networks.” “By leading with our advanced technology, such as Link Guardian, we position ComNet and our solutions as the company to turn for ‘new and better’ transmission options. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing.
Forensic Access is a renowned provider of a broad range forensic science services to the criminal justice system and the acquisition of digital forensics specialists IntaForensics consolidates their position as an international market provider. The acquisition backed by Limerston Capital is anticipated to reshape the forensics landscape, building on decades of world-class expertise. Oxfordshire-based Forensic Access’ portfolio of expertise covers the spectrum of forensic services from biology chemistry and medicine to firearms, fibers and Fingerprints. Nuneaton-based IntaForensics are internationally recognized specialists in digital forensics and cybersecurity. Industry quality standards Despite the challenges of last year Forensic Access and IntaForensics have continued to grow, which is testimony to the caliber of their scientists and support teams. Both companies have helped to define industry quality standards and are highly committed to the future of forensics. We are delighted to bring Andrew Frowen and his outstanding teams at IntaForensics into the fold" Commenting on the acquisition Rachel Jansen, CEO of Forensic Access, said “We are delighted to bring Andrew Frowen and his outstanding forensic and cyber teams at IntaForensics into the fold. We jointly share the strategy and vision of providing leading support to our valued customers through investment in technology, quality and innovation.” Drive additional innovation Andrew Frowen, CEO of IntaForensics, shares the sentiment commenting “This is a tremendous opportunity for both companies and a testament to the tireless dedication from all the staff at IntaForensics. We are all looking forward to working with Rachel and the Forensic Access team dedicating significant resources and investment to drive additional innovation throughout the combined product lines, with the common goal of taking customer satisfaction to new heights.” Limerston Capital described the acquisition as a milestone commenting “Combining Forensic Access’ outstanding lab forensic services with IntaForensics’ leading digital forensics and cyber capabilities will further enhance the reach and product suite of the group. We are delighted to have supported Rachel and the Forensic Access management team in this first transaction.”
Alarm.com has developed the first cellular sensor with virtually no range limitations for monitoring valuable property and assets. The Alarm.com Flex IO™, a battery-powered device that is weatherproofed for outdoor durability, uses the latest LTE-M technology to operate anywhere there is LTE coverage and without a panel, hub or even Wi-Fi. The one-of-a-kind sensor works as a standalone solution or as an expansion of a person’s existing Alarm.com-powered system. The Flex IO™ sensor sets up in seconds and can be attached to almost anything to help people keep an eye on doors, gates, sheds, barns, detached garages, guest houses and other access points around their property. Expected battery life In addition, the wired magna-loop input option keeps users informed if freestanding items, like a motorcycle or lawn mower, are moved. “I’m extremely impressed by the Flex IO sensor after testing it as both an outdoor gate sensor and with the wired loop,” said Charles Hadsell, CEO of ePropertyCare. The Alarm.com Flex IO has an expected battery life of more than two years “The use cases for it seem almost limitless. Many of our customers come to us looking for help securing and monitoring things in areas outside the reach of their existing system. The Flex IO sensor is what we’ve needed to solve those challenges. I think it’s going to be a big hit because there’s nothing else like it on the market.” The Alarm.com Flex IO has an expected battery life of more than two years and seamlessly integrates with the existing Alarm.com ecosystem of connected smart home devices. Smart property monitoring Subscribers can stay informed about pertinent activity detected by the Flex IO sensor through real-time notifications and customizable alerts configured through the Alarm.com mobile app. “The Flex IO sensor expands the boundaries of smart property monitoring while redefining the uses for an activity sensor,” said Alison Slavin, co-founder and senior vice president at Alarm.com. “It’s an extremely versatile solution that’s ready for the challenge of what home or business owners want to monitor without being restricted by location.” The Alarm.com Flex IO offers enhanced awareness for property owners, one of the key elements of security. As a standalone solution, Flex IO also can be used in other applications where consumer needs have gone unmet due to range restrictions. The device is currently available through authorized Alarm.com partners. Flex IO is a trademark of Alarm.com.


Expert commentary
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
This year has brought about changes in virtually every sector. As with other frontline industries, the security sector has been tested more than those able to move entirely to remote working. While the promise of a vaccine means an end is in sight, the post-COVID era will not bring with it a return to the ‘normal’ we knew before the pandemic. Organizations have adapted, becoming more resilient and agile and this will have lasting effects. The coming months will continue to be testing. The tiered system will see the precautions in place fluctuate with the situation. Initial lockdown period At the same time, a gradual return to normal as the vaccine is rolled out will require adaptive measures. The security sector will be at the heart of keeping people safe throughout this process. The initial lockdown period and the first wave of panic buying might seem like a lifetime ago. However, the introduction of the second lockdown in November was accompanied by another wave of stockpiling despite organizations trying to reassure their customers. It is uncertainty that breeds anxiety, and we continue to see this as the restrictions fluctuate across the country. The tier system depends upon a number of factors: case detection rate, how quickly case numbers are rising or falling, positive COVID-19 test numbers in the general population, pressure on the NHS in that region, and local context and exceptional circumstances. Social distancing measures For the sector to meet demand, technology will be needed to work alongside the manned guarding role While travel is allowed in all tiers if necessary for work, government advice still recommends that those able to work from home should do so. This means that throughout the country, many buildings will remain empty or at minimal capacity for some time to come. Security risks vary with the restrictions in each area. Although shops are largely open, tier three still requires the closure of many premises. Vacant premises are more vulnerable to theft and damage, meaning officers and security technology remain in higher demand than usual. As more premises are allowed to open, the need for officers to implement social distancing measures increases, stretching the sector like never before. For the sector to meet demand, technology will be needed to work alongside the manned guarding role. Temperature checking devices It will continue to be important in providing security when officers cannot be present in person through CCTV and sensors. But it will also be integrated into the manned guarding role to streamline processes. We are already seeing the start of this as many officers are using handheld temperature checking devices to reduce the spread of COVID-19. We’ll also see temperature scanners installed into buildings to allow security guards to focus on other priorities. Those businesses that are open will need to continue to adapt to the changing regulations in the coming months. Christmas is a busy period that stretches the retail sector. Unpredictability results in heightened stress levels and makes it more difficult for people to reliably take in and recall information. Security officers are a key first point of contact both to enforce measures and reassure anxious staff and members of the public. Enforcing one-Way systems Security staff will need to keep members of the public safe and prevent disruption Some shops are enforcing one-way systems and limiting the number of customers allowed inside. Over Christmas, many more may choose to do so. Security officers will be responsible for ensuring these precautions are followed. With the heightened pressure of the festive period, it can be hard to predict how members of the public will respond to officers enforcing measures. Security staff will need to keep members of the public safe and prevent disruption. Doing so will require tact and empathy in dealing with customers. Within shops, too, officers will be tasked with ensuring social distancing and other measures are followed effectively. Doing so, they must work closely with clients to understand what protocols are in place and how to handle a breach. They must also be able to enact discretion. For example, clients may not take issue with protocols being broken momentarily or accidentally. Extensive government guidance There is extensive government guidance on the precautions that should be taken on various premises. They include the introduction of one-way systems and limiting building capacity. Measures such as one-way systems may be broken by those that don’t notice or don’t care. Officers must be able to judge what responses are appropriate while maintaining a calm and reassuring presence. The security officer role has long been moving toward a more front of house position as, for many visitors to a building, they are the first point of contact. The pandemic has accelerated this trend. Working on the frontline of the pandemic, officers have had to play a more multifaceted role than ever before. Officers still act as deterrents and manage security issues, but they must also use empathy and strong communication skills to inform and reassure customers and staff onsite. Adapting to new technology They will need to be able to learn quickly on the job and adapt to new technology and practices Being able to demonstrate this flexibility and to read a situation and react appropriately will be some of the skills most in demand in the industry in the future. Officers will need to build close working relationships with clients. In addition, many will have new roles, such as taking temperatures with handheld devices. They will need to be able to learn quickly on the job and adapt to new technology and practices. Technology, too, will be more important. If the global pandemic has driven any point home, it is that we cannot always see or sense threats. Data-Driven insights Temperature checks and occupancy sensors will be the norm in protecting from COVID, while security technology and data-driven insights will continue to grow in popularity. The security sector specializes in adapting to the unexpected and the threatening. It continues to demonstrate incredible value through the pandemic. While the coming months will undoubtedly be trying, the sector is adapting. Lessons have been learned from the pandemic that will affect business globally. Security specialists are taking these on and creating a stronger and more effective industry.
In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organizations are still engaged primarily in “anywhere operations”, i.e. remote work, many organizations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organizations that have returned to in-person work. But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organization will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organizations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organizations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.
Security beat
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalized within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full program of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalized within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognize how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximize effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilize. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analyzing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimize security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioral analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labor-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Case studies
Ipsotek, a pioneer in artificial intelligence (AI) powered video analytics, has announced that it has been awarded a security systems project at the Katara Culture Village in Doha, Qatar, in partnership with Mannai Trading Co, a Qatari based company listed on the Qatar Stock Exchange. Ipsotek’s highly scalable VISuite AI platform and advanced VISuite FR facial recognition system have been selected and approved by the Qatar Ministry of Interior to improve the security and safety as well as provide business intelligence at the iconic cultural village of Katara. VISuite AI enables users to efficiently manage automatically generated alarms in real-time, resulting in reduced operator response times and the ability to track chosen behaviors of interest in complex environments. Security threat VISuite FR automatically detects and informs operators of people that have visited a site multiple times in a configurable timeframe and could pose a security threat. It is optimized for use in busy and security-sensitives scenarios where the highest level of recognition is required. In addition to the project at Katara in collaboration with Mannai ICT, Qatar’s renowned Systems Integrator and the Information & Communication Technology Division of Mannai Corporation, Ipsotek has a number of other major projects across Qatar. The company has also announced that it has appointed Mr Jihad Marei as Country Manager for Qatar and is in the process of opening a new office in one of Qatar’s Free Zones. Key strategic partners We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co." Also known as ‘The Valley of Cultures’, Katara is one of the main cultural destinations in Qatar, featuring a museum, open amphitheatre, opera house, movie theater, conference hall, beach, Souq and multiple restaurants. Katara hosts hundreds of events and attracts over 10 million visitors each year. Charlie Bennett, Ipsotek Head of Sales for EMEA said: “We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co. Mannai has become one of our key strategic partners in Qatar and we have enjoyed collaborating on several projects together this year, which is why we have also chosen to grow our presence in country further by employing Jihad Marei as Country Manager and open a dedicated office in Qatar.” Artificial intelligence video analytics Shamnad Karuvadi, Deputy Manager ELV Physical Security at Mannai Trading Co said: “We are very pleased to be working with Ipsotek as our solution partner for Artificial Intelligence Video Analytics. Ipsotek has added a great deal of value to the Mannai solution portfolio and together we look forward to providing the highest levels of safety and security to protect critical infrastructure. We would like to extend our sincere thanks to Charlie Bennet & Mr. Jihad Marei at Ipsotek for their extensive support.”
Two museums, a single security environment. As a result, access management was eating up significant time and budget for the museums’ Technical and Security Manager. The solution for simpler access management was eCLIQ, an electronic locking system built around easy-to-fit cylinders and programmable, battery-powered keys. The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential — for both internal and external users. They needed a system able to cope easily with changes, site extensions and two-site operation; a solution which would remove the need to change all cylinders when an employee loses a key. Simplified access management Now the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders across the two sites. The eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key-holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Monitoring service providers Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to both employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers — and their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. Fitting eCLIQ locking was simple and wire-free: museum staff performed the installation themselves. One training session with the admin software was sufficient to put them at ease with their new system. Efficient energy management Looking after eCLIQ components is also easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. “I am very happy with the eCLIQ solution,” says M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums. “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council to show the effectiveness and simplicity of the eCLIQ solution. Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
nmcn Asset Security has been awarded a contract to provide capital security upgrades prior to planned and reactive security maintenance to the Exeter based Headquarters of the Met Office. The agreement will see nmcn provide a turnkey design and build security upgrade to implement the latest technology and systems across the Met Office Exeter HQ estate which houses the majority of their circa 2000 workforce. Critical weather services Following key upgrade works across the Met Office HQ estate, nmcn will then take responsibility for planned and reactive maintenance of security systems and associated technology. The relationship with the Met Office strengthens nmcn’s regional focus in the South West, who are a tier one partner to South West Water, as well as numerous other regional clients. The Met Office is the national meteorological service for the UK, providing critical weather services and climate science for domestic and overseas use. Since their foundation in 1854, the Met Office has pioneered the science of meteorology and its application. To this day, they continue to push the boundaries of science and technology, to meet the demands of today and the future. Formal business ownership The Met Office is a British institution with a strong heritage for leading public service" Adam Smith, Managing Director of Asset Security at nmcn, said: “The Met Office is a British institution with a strong heritage for leading public service, military and commercial forecasting around the world. The security of their operations is paramount and I’m delighted we’re able to support them through this contract. We look forward to working closely with the Met Office over the coming years to bring value, collaboration and quality.” The ultimate responsibility and accountability for the work of the Met Office is with the Secretary of State for Business, Energy and Industrial Strategy. Day-to-day ministerial oversight and the formal business ownership role are delegated to the Minister of State for Universities, Science, Research and Innovation. Security framework positions Met Office Security Manager, Richard Kevern, said: “As we continue to deliver critical weather forecasting and climate science services, the security of our people and assets is of paramount importance. We look forward to working collaboratively with nmcn on both the capital and maintenance program over the coming years.” nmcn also recently secured a Framework position with the NHS Shared Business Services to provide security solutions to the NHS, across the UK and hold Security Framework positions with the Crown Commercial Services, Defra and multiple Regulated Utility providers.
HID Global, a worldwide provider of trusted identity solutions, announced that popular aerospace company Avolon has selected the HID Mobile Access solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Avolon is one of the world’s largest aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID’s readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. Manage access rights “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, Facilities Project Manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralized, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. Touchless access control “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organizations in the today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
HID Global, a pioneer in trusted identity solutions, announces that aerospace company Avolon has selected the HID Mobile Access® solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos® credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Maintaining secure perimeter Avolon is one of the aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID® readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility" “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, facilities project manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Touchless access control The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralized, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organizations in today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
MSC Mediterranean Shipping Company S.A. (MSC) is the world's second-largest shipping line in terms of container vessel capacity. It operates 480 offices across 155 countries worldwide with over 24,000 employees. MSC’s shipping line sails on more than 200 trade routes, calling at over 315 ports. Challenges MSc searched for options to manage attendance in the office spread across 15+ locations. A central server that can handle the capacity of 1000+ users and can seamlessly integrate with their accounting software - SAP. Additionally, they required a fool-proof solution that can assist them to manage multiple shifts with automated shift correction options and work hour’s calculation in overnight shifts and more. Solution The offered solution deploys the access control solution that enables complete security of all their units Matrix addressed these challenges by proposing a Door Controller for the locations connected by a central platform. This Time-Attendance Solution helps them to procure accurate attendance details of an employee in no time. Furthermore, this attendance data is integrated with accounting software - SAP for seamless attendance and payroll management. The offered solution deploys the access control solution that enables complete security of all their units. COSEC PVR Door Controller - a contactless biometric that is engineered to offer the utmost security, eliminates the risk for forgery or identity duplication. Results Effortless attendance management of all location from head office Multiple connectivity options Streamlined shift allocation and automated shift correction Seamless integration with SAP Customized attendance policy formation Real-time alert on attendance related event and auto scheduled reporting No correction required for overnight shift environment Products and Solutions Offered: COSEC PVR DOOR CONTROLLER - Palm Vein Door Controller COSEC CENTRA LE - Application Server Platform with 1000 Users COSEC LE TAM - Time Attendance Software Module COSEC LE ACM - Access Control Software Module


Products


Round table discussion
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
White papers

Cloud Video and Smart Cities
Download
Physical Access Control In Higher Education
Download
'Boosting On-Site Safety And Security
Download
How Door Handles and Levers with Antimicrobial Treatment Reduce Disease Spread
Download
Building A Safe Ecosystem For Visitors Post COVID-19
Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce Cost
Download
Wireless Security: Cut Costs Without Cutting Corners
Download
The 2020 State of Physical Access Control Report
Download
Access Control & Intelligent Vehicle Screening
Download
3 Reasons To Migrate To A New Access Control System
Download
Schooling the Market on Education Security
Download
The Security Behind Financial Security
Download
Is Your Access Control As Effective As You Think?
Download
