Today’s market wants access management systems that are easy to set up and use. They must be easily scalable and able to integrate with other security solutions like video and intrusion systems. And access management systems need to be highly resilient and always available. With the introduction of the Access Management System 2.0, Bosch has addressed all these needs. Access Management System 2.0 The entire customer journey is designed to be as effortless and as simple as possible. Speci...
Johnson Controls has announced the release of the advanced CEM Systems S3050 Portable Reader is a lightweight hand-held card reading device for use with the AC2000 access control and security management system. It is designed to be used for ID card validation at temporary entrances or remote sites which have no power and as a mobile device for random checks within pre-defined zones. Portable ID card reader A large full color touch screen provides quick and easy navigation and also provides inf...
NEC Corporation and NEC Asia Pacific have announced their participation at the inaugural SFF x Switch event at the Singapore EXPO Convention & Exhibition Center from 11th to 15th November 2019. SFF x Switch During the three-day exhibition and conference of SFF x Switch (11-13 November), NEC will exhibit a suite of digital solutions aimed at empowering financial service providers with the technology to create innovative digital services for their customers. Key solutions to be exhibit...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are demonstrating an integrated optical turnstile solution in booth #703 at the ISC East exhibition in New York City. ISC East is the largest security trade show in the Northeast region of the US, bringing together 7,000 security and public safety professionals with over 300 leading security brands for the 2-day event. Boon Edam is also the official turnstile sponsor of the show, which runs...
Vanderbilt, globally renowned provider of state-of-the-art security systems, has announced the addition of three ZKTeco biometric readers into its access control portfolio. ZKTeco biometric readers The latest addition to the ever-growing access control portfolio comes off the back of the launch of the company’s Bluetooth Low Energy (BLE) readers, plus the inclusion of Akuvox’s IP Door Entry Phones into their collection of products. As with the BLE readers, the biometric readers int...
Arcules, the innovator of integrated cloud-based video and access control services, announces a partnership with Siemens Smart Infrastructure (SI) to provide its Integrated Video Surveillance Service to modern enterprises. The collaboration is intended to be global, starting across North America. The partnership between Arcules and Siemens demonstrates the increasing importance of cloud-based security solutions, which have recently experienced tremendous growth. By offering the Arcules Service,...
Farpointe Data, the access control industry's OEM for RFID credentials and readers, has announced that at ISC East 2019 on November 20-21 in Booth 947, attendees can see how the company’s Conekt mobile smart phone access control identification solution integrates the same advantages for Android smartphones as Apple iOS delivers, such as 3-D Touch, Widget and Auto-Unlock, into the Conekt Wallet App version 1.1.0. All new improvements create the same increased user conveniences for Android users as iPhone users obtained in May. Mobile access credentials Conekt's Android solution provides the easiest way to distribute mobile access credentials" "As these improved Wallet App features have been provided to iPhone end users since May, this new version lets access control system manufacturers, integrators and dealers provide their Android customer base with the simplest to use mobile access credentials in the market," explains Scott Lindley, general manager of Farpointe Data. He adds, "Similar to our most recent Wallet App supporting Apple's latest iOS version13.1.3, Conekt's Android solution provides the easiest way to distribute mobile access credentials with features that include allowing the user to register only once and requiring only the handset's phone number. No portal accounts or activation features are required. By removing these and additional personal information disclosures, we also address privacy concerns that have been slowing adoption of this technology." Parking, lobby and suite specific access control systems For instance, the newly improved Widget lets the user make up to three mobile control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as parking, lobby and suite specific access control systems, directly from the Android's home screen. With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their personal preferred combination. For example, a delivery driver may choose to simply enter the van parking area, receiving dock and restrooms, while the vice president gets access to the boardroom, executive dining room and reserved parking facility. Auto-Unlock with Conekt mobile access credential Lastly, Auto-Unlock lets a user select the Conekt mobile access credential they want as their favorite. Once activated and designated, a little star appears in the upper right corner of the mobile access credential. As the favorite, this mobile credential is transmitted immediately whenever the Wallet App is selected. All new Android Wallet App features are available for immediate no-cost download on the Google Play Store and will continue to operate securely behind the smart phone's PIN code and biometric defenses.
MedixSafe, a provider of access control cabinet market, is pleased to announce the launch of its new website showcasing its diverse access and key control solutions. The Memphis, TN-based company was founded in 2009 when it first began designing and manufacturing narcotics control cabinets for the EMS market. MedixSafe’s triple security-plus technology® with wireless connection to a user’s network and mobile devices enables the user to reliably monitor and track access to their stored assets 24/7. Biometric authentication credentials MedixSafe also brings to market its innovative Key Access Ready Enclosure (KARE) The MedixSafe line card of product offerings has grown exponentially over the years to meet the growing and diverse needs of customers seeking control over stored assets and the keys associated with accessing them. The MedixSafe product line now includes its standalone Key Care Cabinet which can require dual, triple or biometric authentication credentials to grant access. The Key Care Cabinet accommodates over 1,000 individual users and provides an audit trail history of up to 50,000 events to ensure security and complete control over sensitive keys. MedixSafe also brings to market its innovative Key Access Ready Enclosure (KARE), a heavy duty key control cabinet with an HID format or a Multiclass card reader (125kHz Prox or 13.56 MHz; iCLASS®, iCLASS Elite, iCLASS SEOS™, iCLASS SE, ISO 15693 iCLASS, ISO 14443A Mifare, Mifare Plus, Desfire SE, Desfire EV1, HCE over NFC) and a key override built right into the electronic lock. Offline data management capability The company’s Custom Safes and Gun Safes are built to specifications based on customer requests The KARE reader features a Wiegand output so it can be connected to any access control panel. Much more than merely a place to store keys, it gives the user control over their keys by limiting access to authorized users only and knowledge of who has accessed keys and when. The company’s Custom Safes and Gun Safes are built to specifications based on customer requests. From customized shelving to multi-credential access, offline data management capability and activity logs, the safes offer user’s the security they need with the features they want. Key control solutions MedixSafe’s key control solutions are meeting the needs of Fire and EMS departments, Police Departments, Aviation Authorities, doctors, dentists, veterinarians, University research departments and schools of medicine, hospitals, pharmacies, realtors, commercial and industrial clients, and the U.S. Army and the U.S. Navy. "MedixSafe is committed to delivering the very best in key control," says Jim Turner, President, MedixSafe. “We are proud to introduce our new website showcasing our diverse access and key control offerings, No access control system is complete until you can control the keys, and MedixSafe solutions allow users to do exactly that!”
UVeye, global provider of top-tier solutions for automated external inspection of vehicles, has officially launched its UV Inspect threat detection technology. Developed to instantly detect threats – such as bombs, weapons, and drugs – stowed in the undercarriage of vehicles, UV Inspect is powered by deep learning computer vision technologies. UV Inspect threat detection UV Inspect meets the challenge of automating threat detection for new and unfamiliar vehicles. The pioneering UV Inspect algorithm analyzes each vehicle part separately, using the deep learning computer vision to identify every element on the undercarriage of the vehicle and detect threats within seconds. This advancement in detection capabilities is built on UVeye’s extensive work in training its deep learning algorithms to truly understand what each part of a vehicle is supposed to look like, independent of make or model or the need for previous examples on record. Examples of the depth of this research become evident in the UV Inspect technology’s ability to identify items like an exhaust pipe without having previously scanned the vehicle. UVeye is addressing the needs of border control operators and other security professionals" Secure vehicle scanning “As the first to offer a true first pass solution, UVeye is addressing the needs of border control operators and other security professionals tasked with examining non-repeat traffic to securely scan vehicles passing through their checkpoints,” says Amir Hever, UVeye’s CEO and co-founder. He adds, “Our team has developed a reliable method of identifying anomalous objects without the need for earlier reference points, using only the information captured in our high resolution images at the time of the scan.” UVcompare deep learning-driven system With this launch, UV Inspect joins UVeye’s arsenal of detection technologies, which includes UVcompare, the deep learning-driven system that monitors trends of repeat traffic to identify changes which could indicate a threat or issue for concern. This technology works by identifying trends on a specific vehicle over time, without the need to compare the image to a model from the manufacturer. In the coming months, UVeye plans to expand the implementation of the UV Inspect technology to further support its global customers across the security market. UVeye’s technology is currently deployed all over the world at high security facilities such as banks, embassies, prisons, military bases, airports, and more.
Allied Universal, global security and facility services company in North America, has recently announced the acquisition of Advent Systems, Inc., international low-voltage integrator of IP video, access control, structured cabling and audio/visual systems based in Elmhurst, Illinois, a suburb of Chicago. Terms of the deal were not disclosed. acquisition of Advent Systems "Adding Advent Systems helps us grow strategically and geographically especially within the Chicago market," said Steve Jones, CEO of Allied Universal. "We are excited to continue our strategy of expanding our technology division in order to offer highly advanced solutions for our clients." With revenues exceeding $42 million and 125 employees, Advent systems, Inc. has been providing integrated technology solutions since 1994. With offices in Chicago and Little Rock as well as satellite operations in Texas, the company helps protect property and assets with design, installation and service of integrated electronic security systems. Business security solutions The addition of Advent Systems will expand Allied Universal Technology Services division within the Midwest region"For more than 25 years, we've been dedicated to providing our customers with the highest level of service and quality," said Michael Walsdorf, President of Advent Systems, Inc. "We believe Allied Universal supports our business strategy and overall core values, which will result in a continuation of that high level of service and quality to our clients. We're also thrilled to present a path to the future to our employees, who have been an integral part of our growth and success from the beginning." The addition of Advent Systems will expand Allied Universal Technology Services division within the Midwest region. Allied Universal Technology Services provide electronic access control, video surveillance, fire/life safety, alarm monitoring, emergency communications, hosted /managed services and a variety of Global Security Operating Center (GSOC-as-a-Service) offerings. Managed Services "I have known Mike Walsdorf and John Lothrop for 25 years and have successfully partnered with them on many occasions," said Carey Boethel, President of Dallas-based Allied Universal Technology Services. "It is truly an honor to be partnering with them again as we continue to expand our national footprint."
New research commissioned by Check Point shows that GDPR is delivering a strong positive effect overall for European businesses – but with some significant variations between countries in terms of adopting GDPR measures. Check Point has also developed a new free online tool called GDPRate to guide businesses through the essential components of an effective GDPR compliance strategy. The study of 1,000 CTOs, CIOs, IT managers and security managers in France, Germany, Italy, Spain and the UK sought to understand how European companies have addressed the requirements of GDPR. It revealed that 74% of organizations overall (UK respondents: 58%) believe GDPR has had a beneficial impact on consumer trust, and 73% claim it has boosted their data security (UK: 54%). Strategic approach to data security 60% of the overall sample (UK: 53%) say their business has fully adopted all GDPR measures 60% of the overall sample (UK: 53%) say their business has fully adopted all GDPR measures, with just 4% still to begin the process (UK: 10%). When asked to rate their performance in dealing with GDPR requirements on a scale from 0 to 10 (0 is ‘not at all’ and 10 is ‘totally’), the average score was an optimistic 7.91 (UK: 6.55). GDPR has encouraged a strategic approach to data security: the research showed that 65% of CTOs, CIOs, IT & security managers believe their company has an organic and strategic approach to cybersecurity (UK: 39%). This strategic approach is defined as one where measures are applied from the bottom up – and this is being used to meet the obligations of GDPR. Meeting the security requirements The study reveals that significant progress has been made across Europe towards GDPR compliance. 53% of respondents said their organization set up a GDPR working group (UK: 37%). Another 45% allocated budget to cover the costs of implementing GDPR (UK: 33%), while 41% employed GDPR consultants (UK: 37%). From an IT perspective, the most common steps taken to meet the security requirements imposed by GDPR are: Adopting standard security measures (44% overall; UK: 31%) Initiating training for employees to increase understanding of data security risks (41% overall; UK: 29%) Implementing an access and encryption control system (41% overall; UK: 29%) The research also revealed the costs of addressing GDPR requirements. 27% of respondents invested between £42,629 and £127,886. A further 25% said their company’s investment was over £127,887. The country that invested the most to meet its GDPR requirements was Italy, with 34.5% of Italian organizations invested over £127,887, followed by Germany (31.5%). The UK invested the least, with only 12.5% of UK respondents saying their company’s investment was over £127,887. Ensuring sensitive business data It’s important for organizations to adopt robust frameworks to meet the demands of GDPR"Rafi Kretchmer, Head of Product Marketing at Check Point Software said: “What’s clear from this research is that many European organizations have made significant progress in implementing the steps required to become GDPR compliant. And quite a few are already seeing powerful benefits. But for many firms there’s still a lot that can be done.” “It’s important for organizations to adopt robust frameworks to meet the demands of GDPR, rather than simply shutting down access to tools and platforms that both employees and customers want to use – like mobile devices and the cloud. There are relatively easy-to-integrate methods of keeping data safe – such as document encryption and hard drive encryption. These approaches can ensure sensitive business data is protected, preventing data leaks and unauthorized access to data.” Protecting private data GDPR’s main aim is to protect private data, so cloud solutions came under scrutiny. Overall, 83% of those polled said their organization uses cloud solutions. But many are more cautious about how the cloud is employed following GDPR’s introduction. Just 7% of companies took the drastic measure of ceasing to use cloud solutions altogether as a result of GDPR. The three most-anticipated long-term benefits of GDPR were found to be: Helping organizations demonstrate their focus on customers’ data and increasing loyalty (45%) Making operations more efficient, especially regarding cybersecurity (44%) Providing a more comprehensive view on the information processed by the company (40%) Effective GDPR compliance strategy However, nearly 13% overall believe that GDPR won’t bring any benefits to their business at all. The countries most pessimistic about GDPR’s benefits were Germany and the UK, with 21.5% and 20% of respondents stating that GDPR will not bring benefits. Respondents from Spain (3.5%) and Italy (6%) were more optimistic about GDPR benefits. Check Point has also developed a new application called GDPRate to guide businesses through the essential components of an effective GDPR compliance strategy. The tool checks the organization’s readiness for the GDPR 14 security standards and requirements as it pertains to using security products to comply with these standards.
ISC Security Events and the Security Industry Association (SIA) are pleased to announce that security and public safety leaders Deanne Criswell and Angela Stubblefield will headline the 2019 SIA Education@ISC East Keynote Series. These keynote sessions are open to all attendees at ISC East – the Northeast’s largest security trade show – taking place Nov. 20-21 at the Jacob K. Javits Convention Center in New York City. Criswell will share her insights on emergency preparedness, crisis management and disaster response In the Day 1 keynote Leveraging Technology to Improve Decision Making: A New Direction in Emergency Management and Disaster Preparedness, Criswell – commissioner of the New York City Emergency Management Department – will highlight how the department is leveraging technology to make informed, data-driven decisions and discuss the department’s strategic vision and the importance of public-private partnerships. Criswell will share her firsthand experiences and insights on emergency preparedness, crisis management and disaster response, including lessons learned and best practices to take back to your business and organization. FAA Perspectives on Addressing Risks In the Day 2 keynote UAS Security: FAA Perspectives on Addressing Risks Posed by Errant or Malicious UAS, Stubblefield – who has served as the deputy associate administrator for security and hazardous materials safety at the Federal Aviation Administration (FAA) since 2013 and will assume the role of FAA chief of staff on Nov. 4 – will discuss the FAA’s holistic approach to aerial drone security, working across the full spectrum of risk mitigation from prevention to deterrence, detection and response. Stubblefield will highlight how the FAA is working with security partners to consider how to set requirements for the aircraft, airspace and airman in order to help reduce security risks, how intent can be difficult to determine and how different tools help to differentiate the clueless and careless from the criminal, which require different response capabilities. sessions on access control, drones “ISC East is thrilled to welcome Deanne Criswell and Angela Stubblefield as our 2019 keynote speakers; their demonstrated expertise and success in emergency preparedness, planning, operations and response, threat analysis and response, national security and critical infrastructure policy and more will provide valuable insights to our attendees,” said Will Wise, group vice president, security portfolio at Reed Exhibitions. “These keynote sessions will share essential knowledge to help security and public safety professionals stay up to date on the emerging risks and response strategies in our evolving connected world.” In addition to the Keynote Series, ISC East attendees will have access to over 25 free education sessions and four paid workshop offerings through the 2019 SIA Education@ISC East program. SIA Education@ISC East will offer all-new content on the most current business trends, technologies and developments in the security and public safety industry. Workshop on OSDP, cyber security terminology and strategy Free sessions covering topics like video analytics in access control, drone security policy and securing public venues They will offer free sessions covering topics like video analytics in access control, drone security policy, securing public venues, cyber-physical-operational convergence and preventing hostile vehicle attacks – and paid workshops on the SIA Open Supervised Device Protocol (OSDP), cybersecurity terminology and strategy, active shooter response and video surveillance installation and configuration. “Each year at ISC East, in addition to learning about a wide array of cutting-edge technologies on the show floor, conference attendees have the opportunity to unlock top-quality education and hear from the industry’s leading luminaries through the ISC East Keynote Series,” said Dr. Elli Voorhees, director of education and training at SIA. ISC East She adds, “These keynote presentations from Deanne Criswell, an esteemed emergency management expert, and Angela Stubblefield, a respected leader in national security, safety and crisis response, combined with dozens of other engaging SIA Education@ISC sessions will deliver a high-impact content program for ISC East 2019.” At ISC East, over 7,500 security and public safety professionals will convene in New York to meet experts from over 300 major security brands. With opportunities to engage with the industry’s top innovators, special events and cutting-edge education encompassing everything from video surveillance and access control to smart home technologies, the Internet of Things and drones and robotics, ISC East 2019 will provide a comprehensive security industry event experience and help attendees find the products and solutions that will benefit their organizations and clients.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Traka’s innovative key and equipment management solutions have been installed at a new national distribution center for a top four UK supermarket. The new distribution center, fulfills orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centers are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorized personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centers are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorized colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organizations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorized ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organizations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorized manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
A global UK department store, with a commitment to offering quality products and outstanding service, has ensured the protection of its customer service mobile equipment with Traka’s intelligent locker solutions. Traka’s specialist locker systems The high street favorite has integrated Traka’s specialist locker systems throughout its branch network and top ranking online operations, to store, charge and manage dedicated mobile devices, enabling instant availability for customer service teams across the UK. The high street favorite has integrated Traka’s specialist locker systems throughout its branch network The move was part of a key store investment strategy, which introduced the mobile devices to enable authorized users to take web orders and respond to customer enquiries and stock checks, instantly and efficiently. Digital key management Speaking about the use of digital key management and its impact on the department store processes, a representative for the store said, “We are devoted to working on every aspect of our operations, to continue our pledge of delivering quality products and outstanding service. We believe this, put together with our continued commitment to price matching is what is resonating with our customers.” “We want to streamline our stores and online services to be equally enjoyable places to shop. We are aware we need to respond to personalized customer queries quickly and efficiently, with the right information on any product or service. Intelligent tracking technology “To achieve this, we need our customer-facing teams to be equipped with fast working intelligent technology. Here, Traka excelled at providing a branch solution that allows us to not only store dedicated devices securely, but also integrates into our daily operational systems. We can track where each device is and provide staff with peace of mind that every device is fully charged and up to date with our latest exclusive offers.” Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software. This offered in-locker charging facilities, full audit control capability, dedicated fault reporting on any issues with a piece of equipment, and capability to exchange an item with minimal time or resource disruption. Intelligent locker systems Steve Bumphrey, Traka UK Sales Director added, “Any department store’s success is dependent on providing a high level of service, deep knowledge of what it is they’re selling, and a willingness to ensure customers receive the right item. Being able to do so quickly and efficiently, is where the introduction of mobile devices have proven invaluable.” Steve adds, “Traka’s involvement was to understand the unique requirements of the customer services teams and create and network our intelligent locker systems, to make a significant operational difference. Staff no longer need to hunt for working devices to respond to customer enquiries, safe in the knowledge they are ready to use with very latest cross brand and department product and service information and pricing.”
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognize with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilize a national hooligan register with the system to help spot traveling troublemakers within Denmark.
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorized employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
VuWall, the pioneer in video wall control and AV network management, announces that the Canadian Space Agency (CSA) successfully deployed VuWall's VuScape processor to monitor the launch of the satellites and their trajectory for the RADARSAT Constellation Mission (RCM). Installed by Applied Electronics, VuScape video wall controller shares and manages incoming content to the control rooms' video walls. Managing multiple surfaces and streams of information "The RCM will collect information from multiple satellites that is critical to maritime management, disaster management, and ecosystem monitoring in Canada," said Paul Vander Plaetse, CEO at VuWall. The CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling" "From a single VuScape processor, the CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling. This is an excellent example of how our affordable visualization solutions can be scaled and tailored to meet the needs of any organization — from the smallest to the largest and most mission-critical deployments — while adding capabilities that further the value of the system." Performing maintenance and control operations For the project, VuWall's VuScape processor shares the incoming information on the video wall in both mission control rooms and meeting rooms. Control room operators can easily configure and update the layouts as needed on each of the video walls, providing them with at-a-glance information that's vital for performing maintenance and control operations on the satellites that they are mandated to monitor. With a single VuScape processor driving multiple video walls in multiple rooms, the CSA is able to manage the access and control of each individual surface with user profile management, limiting access to view and/or manage video wall content only to authorized personnel.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?