As buildings become more complex and smarter, the age-old traditional maintenance methods that are based mostly on hands-on human monitoring are becoming more and more inadequate. Instead, the world is fast adopting building automation as a key component of smarter and more proactive maintenance strategies. The aim is to free up maintenance staff and give them time to focus on other tasks while machines monitor the different systems that work together to make the facility functional. Specific...
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as poss...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioral analytics to IoT devices, detecting anomalies and preventing their compromis...
Johnson Controls announces the release of Metasys 10.0, designed to deliver more unified building management. This latest Metasys release provides facility personnel with smarter building automation, faster responses to critical alarms and new integrations with fire detection, security and lighting systems – all with visibility from a single common interface. Metasys 10.0 Integrations Metasys 10.0 introduces a new and improved set of integrations. These include new integrations with C&mi...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can appl...
PSA, the world’s largest security and systems integrator consortium, announces the education lineup, conference agenda and a new exhibit showcase date for TEC 2019 to be held March 11-14, 2019 at the Sheraton Downtown in Denver, CO. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets. This year’s education conference will feature over 100 education sessions, workshops and certification trainings from industry leading experts and partner organizations. Dedicated Learning Tracks The event will also leverage a full-day of dedicated exhibit hours on Thursday, March 14, 2019 The event will also leverage a full-day of dedicated exhibit hours on Thursday, March 14, 2019 where more than 125 security and audio-visual vendors will showcase their product and services along with networking events that utilize the offerings of Denver. “We are very excited about the changes coming to TEC this year that will further open the doors of this conference to more systems integration companies across the nation,” said Kim Garcia, director of marketing for PSA. “For many years TEC has been open to all industry professionals to attend regardless of their affiliation with PSA because the training we offer is meant to better the industry as a whole as well as the attendees in their personal disciplines.” Exchanging Information The TEC 2019 education program will deliver invaluable sessions to systems integration professionals with a desire to stay relevant and thrive in changing markets through personal and professional development. With dedicated learning tracks focused on job function, attendees will leave TEC with ways to improve operational efficiencies, add additional value to their businesses and their customers’ journeys and support emerging market trends including managed services and cybersecurity from their own vantage points. PSA TEC is all about building relationships and exchanging information with people who share the same challenges you do every day" “TEC is really one of the best kept secrets in our industry for any professional looking for a training and exhibit venue where they don’t get lost in the crowd,” said Garcia. “PSA TEC is all about building relationships and exchanging information with people who share the same challenges you do every day. Whether you are a business owner, technician, project manager, sales and marketing professional or operational support, there is training available to you at TEC that can make you better at your job.” General registration opens on December 12, 2018. PSA Owners/Members will have exclusive registration access starting on December 5, 2018. Discounted early bird pricing is available until January 12, 2019 for all attendees.
Shaking hands, exchanging business cards, and making meaningful business connections with exhibitors were 8,420 trade visitors from both government and commercial sectors who roamed across 7,000 sqm of exhibition space at the Bangkok International Convention and Exhibition Center. “Smart city was an overarching theme at this 6th edition of the fair,” said Ms Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Limited. “This, together with three concurrent events for fire & safety, smart home, and info security, ensured that all of the market’s most important needs were covered.” Understanding Market Exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology “The feedback from visitors and exhibitors alike on the quality and comprehensiveness of the show has been highly encouraging, and the general consensus is that there is still huge potential for growth in the Thai security industry, particularly in light of the construction taking place across the country.” Bidding to tap into the huge potential of the Thai market, exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology. Dahua, Full Enterprise, Great Lite, Hikvision, HIP global, JVCKenwood, Konica Minolta and ZKTeco were all in attendance with a selection of the latest video surveillance, access control systems and smart city solutions. Ian Shi, Dahua’s overseas business manager for Thailand, spoke about how the company’s participation at Secutech Thailand allows them to deepen their understanding of the market: Smart City Products “Secutech Thailand is the most professional security show in the country. All of the big brands are here and this year we can see customers from many different vertical markets, including the government. For this reason it is a very fruitful exhibition for us to gather market information and understand customer demands. Our surveillance systems can carry out facial and number plate recognition through the use of artificial intelligence. Given that the government is continuing to plan for Thailand 4.0, we see many opportunities in the future for our smart city products.” The smart city theme was also featured at two international pavilions from Taiwan and Singapore. NewDVR, a Singaporean company that specializes in cloud based solutions for smart city were participating at the show for the first time this year in order to launch their smart community solution to property developers. Big Property Developers The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook" The company’s Regional Product Manager, Mr Jonathan Chan said that the market for their solutions is primed for growth and that Secutech Thailand is an excellent way for them to reach potential partners: “The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook. Secutech Thailand gives us a great platform from which to connect with big property developers and partners such as Sunsiri, Design 103 and many more.” With so many different high-tech solutions on display across the fairground, the show was an excellent one stop sourcing platform for trade visitors from across the ASEAN region. Mr Aibert Josha Sainz, a system integrator and IT manager traveled to the show from Laos in order to find the best access control and surveillance systems for his projects. Comprehensive Exhibition “I’m involved in security software integration and I’m here at the show to find CCTV and access control systems that can integrate with our software. This is my first time at Secutech Thailand, it’s a very comprehensive exhibition. Whether you are in the smart city, smart home or smart building sector, whatever you are looking for you can find it here.” The excitement surrounding the smart city, smart home and smart building sectors was equally palpable with regards to Thailand’s fire and safety market. Mr Joji Jose, Marketing Manager of Al Khoory Pumps, a first time exhibitor at the concurrent Fire & Safety Thailand event, recognized the fair as an ideal gateway for international suppliers to enter the market: Gain New Contacts Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products" “Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products. We manufacture fire pumps in Dubai and by participating at Secutech Thailand we are able to promote our brand, gain new contacts, find the right distributors and gather valuable market data.” Another exhibitor to speak in positive tones about the fire and safety market was Mr Ian Brough, General Manager of Raidrop International: “This is the first time we’ve exhibited at Secutech Thailand. We’re a UK manufacturer of fire protection products. The Thai government has enacted some quite strict fire and safety regulations which helps us because our products are all internationally certified.” Educational Seminars “Exhibiting at Secutech Thailand allows us to develop our presence in the market and find distributors. The visitor flow this morning has been very good and we have been able to gain plenty of new contacts.” While business contacts were being made in the aisles of the exhibition hall, a series of nine educational seminars and events were also taking place. With the IoT and digitisation as central themes, the events illuminated the development opportunities for Thailand’s smart cities. Just one of many highlights was the well-received Thailand mayor’s summit, which involved a panel discussion on the key requirements for smart city development and sustainability. Valuable insights about info security, NB – IoT, smart policing, smart building technology and hotel security could also be gained through the fringe program. Safety Certification Regulations Mr Apichart Prasitnarit, a speaker at the ‘Realtech: IoT for Smart Buildings’ seminar and President of the Real Estate and Partnership Trade Association, spoke about how Secutech Thailand’s fringe events help to spark new business growth: These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing" “These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing. Through the seminars, attendees can pick up new ideas which they can then apply to their own businesses. This in turn can stimulate growth within the security industry.” In addition to spotlighting new opportunities, several concurrent events also dealt with the fire and safety challenges that have emerged due to urbanisation. The government has enacted stricter fire and safety certification regulations but there remain large issues with non-compliance. Importance Of Certification Mr Lothar Sysk, Chief Representative of VdS, a security and fire safety certification provider, spoke about how attending Secutech Thailand’s fire and safety forums have helped him to spread the word on the importance of certification: “The seminar is vital for engaging directly with local stakeholders. Even though we have an Asian representative office in Shanghai, VdS is still not very well known in Thailand, so by speaking at the seminar today, we are not only able to promote our brand, but we can also spread the word about the importance of certification, which is a hot topic now in Thailand. I definitely intend to return again to future Secutech Thailand shows.”
Pivot3, global provider of security, Internet of Things (IoT) and hybrid cloud infrastructure solutions, has announced the introduction of the Pivot3 Architect and Engineer (A&E) Program. This initiative will provide architects, engineers and consultants with the resources and support needed to make intelligent decisions when specifying infrastructure platforms at the core of enterprise-class IoT, video surveillance and security solutions for their clients. Pivot3 A&E Program The Pivot3 A&E Program is intended to help specifiers and their clients address the complexities of planning, designing, deploying and managing compute and storage infrastructure for today’s sophisticated security applications including video surveillance, analytics, access control, building management and all other integrated systems. Pivot3 understands the specific needs of both the security and IT markets" A&E firms will gain access to a wide variety of resources that can be used to facilitate projects based on Pivot3's high-performance, ultra-dense, highly resilient solutions that reduce risk, eliminate downtime and data loss, and simplify scale and management. With Pivot3, A&E firms can specify one common infrastructure to consolidate multiple applications and solutions — all manageable through a single pane of glass. Advanced Tools And Support “Pivot3’s A&E program seeks to provide the advanced tools and enhanced support necessary to specify infrastructure solutions that serve as the backbone of intelligent environments,” said Ray Bernard, president and principal consultant, Ray Bernard Consulting Services. “Pivot3 understands the specific needs of both the security and IT markets, as well as the design and deployment challenges in each domain." "The company has the in-depth deployment experience needed in both to effectively support system designers and specifiers in all stages of design and deployment work. The team also understands the client perspectives and issues, and the IT-physical security collaboration dynamics. This new program demonstrates Pivot3’s commitment to helping system designers access the expertise and tools needed to design enterprise-class, IT-proven solutions.” Pivot3 A&E Program members will have access to: Document development and review assistance with specifications, proposals, and commissioning and acceptance plans. A&E resources including CSI MasterFormat 2018 specification documents, 3D BIM Modules for AutoDesk Revit, MS Visio stencils and templates, and CAD drawings. Solution development and design support including review of system architecture, sizing and workload/throughput calculations, and application validation. Dedicated A&E support contact and local support from Pivot3’s Solution Architects and Regional Sales Directors. Design guides, best practices and white papers. Training, webinars and newsletters. Mission-Critical Infrastructure Solutions “The availability of dedicated Pivot3 contacts and resources will help the A&E community consider, design and ultimately, deliver infrastructure solutions that ensure the performance resiliency, and scalability that their customers’ mission-critical environments demand,” said Mike Maddox, director of A&E programs, Pivot3. “The Pivot3 A&E Program will provide the tools, insight and support necessary to achieve the successful design of enterprise-grade, IT-ready infrastructure solutions for a variety of applications and markets.”
Schools are continuing to upgrade security measures for pupil safety. However, on top of all the fundamental challenges schools face, implementing well-rounded and effective security solutions can seem a great difficulty. Andrew Shaw, architectural consultant for Allegion UK, discusses the advantages of electro-mechanical solutions. Schools can equate to some of the most complex security challenges for architects, specifiers and school officials alike. This is because choosing the right solution requires a comprehensive analysis of a building’s design and layout and the different requirements of each perimeter, alongside specific uses, user groups and opening hours. Different areas and spaces, such as reception areas, entry points or classrooms, each need to be approached differently in terms of safety and security measures. Precautionary Lockdown Strategy Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency What’s more, if the building is used for out-of-hours purposes, or if contractors are on-site, these issues will also need to be addressed. Simply put, there’s no one-size-fits-all solution for schools. Security hardware and a precautionary lockdown strategy are necessities, as they are integral to the safety of teachers, students and visitors. Adequate measures need to be implemented so that schools are prepared for, and safeguarded against, external threats or unauthorized access. While a lot of the responsibility falls on the shoulders of facility managers, it’s also important for teachers and administrators to be aware of, and educated on, solutions and training. This means knowing how certain hardware works and how to spot a faulty product. Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency. Unique Building Requirements This is becoming increasingly important with newer systems too, especially as the Internet of Things (IoT) becomes more commonplace within the industry. Integrating electro-mechanical solutions into existing school security systems is now more commonly viewed as an achievable and viable option. Because an off-the-shelf security solution to fit all doesn’t exist, the benefits of integrating both electronic and mechanical solutions into systems are quickly becoming realized. As such, schools are growing more accustomed to tailored solutions based on their own unique building requirements and budgets. Each school layout is unique and, therefore, must address a range of security factors specific to different areas. Many areas within a school’s building design must accommodate for high capacity, especially in places that may be part of a fire escape route. Mechanical Door Hardware Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds All schools need to address three different levels of security. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. Finally, the third level - and the most vulnerable - refers to the core of the school that both pupils and staff occupy. The first level of security is the perimeter, and these areas become more important depending on the time of day. Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds. Incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. Greater Visitor Management An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. This option also allows integration with central security systems, which can be automatically activated and pre-programmed for regular scheduled control. These solutions help lower the risk of potential unauthorized entry, which can lead to theft of equipment, and compromising people’s safety. They also aid facility and site managers in knowing where potential weak points are in the school perimeter. Because schools will most likely have multiple access points, the combination of mechanical hardware and access control systems allows for both security and convenience, providing greater control and monitoring. Efficient Access Control A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building The second level of security is the administration or reception area. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. This area should be able to restrict visitors from freely accessing the rest of the school. A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. When using access control solutions, schools are provided with information on who entered a part of the premises and when, are able to restrict or limit access to specific times of the day, and easily add and delete users, allowing them to manage access to the building more efficiently. Integrated Centralized Systems The areas most susceptible to vulnerability are the internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. For these areas, there are a number of different solutions that will be beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Mechanical solutions, which include a cylinder lock and key, are also ideal for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. When paired with electronic access control systems, mechanical hardware can provide simplified yet improved security levels. Electromagnetic Door Closers Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit In schools, it is often the case that entrance doors will also be fire exits. Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit. When integrated with electronic access control systems, emergency exit points become safer and more secure as access control measures can be added, whether for teachers, pupils or visitors. In the interest of fire safety, and to eliminate the illegal practice of propping fire doors open as well as aid free passage in busy areas, electromagnetic door closers can be linked with the building’s fire alarm system. When the fire alarm sounds (or in the event of a power outage), the electromagnet deactivates, bringing the door to a close in a normal manner, preventing the spread of fire and smoke. Building Design Requirements By design, electronic access control systems are also easy to use and maintain. The reliability and durability of such systems also means that there will be less need for excess time and money spent on maintenance, and there’s peace of mind in knowing the systems are code-compliant. Their flexibility additionally allows for the implementation of a highly-effective bespoke solution. Electronic access control and electronic devices are able to be integrated with or into a variety of other electronic and mechanical systems. This means schools are able to successfully tailor solutions to their own budgets and building design requirements. Fully integrated security solutions and biometrics are becoming increasingly affordable and accessible, giving school officials and managing teams greater control over their buildings. These solutions also give them scalability for the future, meaning systems are both future-proof and easily upgradable.
Nortek Security & Control LLC (NSC) announces the launch of Smart Areas partitioning for the 2GIG GC3 security panel, making it the first and only self-contained wireless security system with zone partitioning. The new functionality makes the benefits of partitioning easy and available to more homeowners than ever before, and is available immediately to every GC3 system – even installed systems – via the new v3.2 firmware release, with no added hardware modules required. Partitioning is the creation of zone groups in a home or building security system so that users can arm some sections of the property while leaving other areas disarmed. Reduces Risk Of Accidents “Smart Areas enables greater personalisation and functionality for the end user, while simplifying installation for the installer,” explained NSC Product Director, Majid Mahmood. “With Smart Areas, the GC3 becomes the first wireless self-contained partitioning panel in the marketplace, complete with a user interface, controller, wireless transceiver, and communicator all in one package.” A household with a pool can keep the sensor at the gate to the pool area armed at all times, even when the rest of the home is disarmed The ability to arm and disarm up to four partitions independently makes 2GIG GC3 security systems more personalized than ever before, adding to homeowner and end-user peace of mind. For example, a household with a pool can keep the sensor at the gate to the pool area armed at all times, even when the rest of the home is disarmed. This reduces the risk of accidents and conforms to new requirements that California and other states require for new pools and spas to have at least one safety measure, including an alarm. Smart Area Partition Or, Smart Areas partitioning can be used to personalize security for multiple tenants in a building, with the main partition securing the common area while the remaining partitions secure the individual units. Each Smart Area partition controls its local zone status, alerts, and notifications – and offers the ability to bypass any zone within the partition. Any zone or zone grouping that needs to be armed or disarmed separately from the rest of the structure can be turned into a Smart Area partition. “2GIG Smart Areas partitioning gives end-users the benefits of partitioning with a new, easy-to-use and intuitive interface, and gives installers a simple and fast set-up solution,” Mahmood concluded. “With the launch of Smart Areas, we’ve made peace of mind more achievable than ever before.” Smart Areas is included with firmware version 3.2 for the GC3 panel.
SALTO Systems, a manufacturer of wire-free smart electronic locking solutions, has released SVN-Flex, a new feature that enables SALTO standalone electronic locks and cylinders to update user credentials directly at the door. This SALTO access control technology makes keyless, wire-free smart buildings a reality. SVN-Flex maximizes the potential, the efficiency and reliability of the SALTO Virtual Network (SVN), increasing the security, control and convenience for users while reducing the costs of installation. “SVN Flex is a game changer that creates a new standard in access control,” said Marc Handels, Chief Marketing and Sales Officer of SALTO Systems. “The door is the ultimate touch point in an access control system and making its wireless smart lock hardware an updating point for user credentials maximizes functionality and brings an unprecedented level of convenience and security for both end users and system administrators.” New Standard In Access Control SALTO access control technology makes keyless, wire-free smart buildings a realityBased on SALTO’s BLUEnet wireless communications technology, SVN core technology and in combination with the trusted access control management platform and high-quality XS4 electronic locking solutions, SVN-Flex extends and increases the number of updating points directly to any door. SVN-Flex functionality can be enabled on any product in the SALTO XS4 BLUEnet enabled electronic lock range. SVN-Flex is managed via SALTO’s ProAccess SPACE web-based access control management software. Adding SVN-Flex to an access control solution results in an exponential increase in security, control, effectiveness and convenience for users and system managers as the communication between devices flows in real-time on wireless online access points and much faster on offline points. SVN-Flex dramatically reduces the cost of installing additional updating points in an access control system yet provides the capability of adding updating points where required. It might have been challenging in the past to provide several updating points on one building floor when required for security, for example. Benefits Of SVN Flex Includes Wireless Locks With SVN-Flex, however, the options for affordable updating points are endless: emergency exits, hall doors, gates equipped with mechanical cylinders, perimeter doors and much more. SVN-Flex dramatically reduces the cost of installing additional updating points in an access control system Another benefit of SVN Flex includes the ability to easily cross-link stand-alone, wireless locks and online access points and integrate into existing IT networks without consuming valuable resources. This produces a reliable, on-premise infrastructure for access control that is designed to adapt and grow with any demand; from just one door and user up to hundreds of doors with thousands of users. In the event of a network failure, SVN-Flex continues to operate seamlessly via SALTO’s SVN data-on-card backbone core technology, ensuring that no one will be locked out or any unwanted access will be permitted. Because SVN-Flex is based on SALTO’s SVN core technology, it’s compatible on those sites that already use SVN. Just by installing SALTO BLUEnet wireless locks or cylinders in high traffic access points, current SALTO customers will benefit from a boost in their existing SVN system because it will increase the number of updating points. Features And Benefits SVN-Flex is an example of SALTO’s commitment to delivering the most technologically- advanced access control solutions on the market"The rest of the offline installation will still work autonomously, but vital information like blacklist dissemination, user access plan updates, battery status reports or access audit trail reports will be updated more frequently. “SVN-Flex is yet another example of SALTO’s commitment to delivering the most technologically- advanced access control solutions on the market – smart, contactless and mobile,” said Handels. “And although our products always include the latest in innovation, they are designed to be affordable and functional for customers of any size: from a two-room office to a university with thousands of doors.” SVN Flex boasts numerous features and benefits which is why SALTO developed a special microsite that provides detailed product information and explains how the supporting technology works together to deliver a comprehensive access control solution.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business Access Controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labor and materials. Today we will look at four focus points: Vertical Markets, Cloud-Based Access Control, Technology Upgrades, and Preventative Maintenance and Service Agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical Markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective salesHaving logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-Based Access Control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology Upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive Maintenance And Service Agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labor 24/7” or a “parts and labor M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical Area Access Management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labor only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, N.Y., would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smart locks and building automation. This year, ASSA ABLOY is marking the 175th anniversary of the Yale brand. Global home security brand “People all over the world trust the brand to protect what they love most in their homes,” says Kate Clark, Managing Director of Yale EMEA at ASSA ABLOY. Although Yale has a successful commercial sector business in the United States, in the rest of the world Yale is a residential brand. The Yale brand is well known in 130 countries from Australia to the Czech Republic to Colombia, and is popular in Africa, too. In the EMEA (Europe, Middle East and Africa) market alone, Yale has around 20,000 products; that’s without counting products sold in the Asia-Pacific and Americas regions. Yale is familiar as a generic term for “lock” in some areas and is one of the largest home security brands in the world. Expansion Into Digital Locks Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand “I think we stand for safety, quality and reliability, and that hasn’t changed,” says Clark. “It’s as important now as ever. We have tried to pioneer new technology in the industry, new innovations. The rate of acceleration has increased, and there are so many technologies we have to understand and work with.” Growing beyond its heritage in mechanical locking systems, Yale is now expanding into digital locks that can protect homes with a high level of security synonymous with the Yale brand. The current selection of locks includes partnerships with tech brands such as Nest Labs (Google) and Alexa (Amazon). There is a rapid acceleration of growth in the electro-mechanical lock market. But even as the focus expands to smart locks and partnerships with tech companies, Yale continues to dedicate time and resources to the design of their core mechanical products. Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand. Yale padlocks and bike locks also keep the name top-of-mind. There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. Beyond Mechanical Locks And PIN Codes “It’s important for people to know that we have been around a long time, and we want to celebrate that,” says Clark. “It’s a fantastic story around the brand and what we have achieved. Internally we have a lot of people doing a lot of great things with the brand. We inspire people working with the brand and show them that this is the pedigree, and it should be cherished. We are also raising awareness among younger people, so they know that we are still relevant.” We have an obligation to show people that the new technologies are just as secure as mechanical locks" There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. “We have to take people on a journey,” says Clark. “We have an obligation to show them that the new technologies are just as secure as mechanical locks. If we eliminate PIN codes, we have to do it in a secure and safe way. Then suddenly access to your home can be made available by a company you trust.” Smart Home Security “We have a responsibility to do our best job with the new technology – it’s wonderful, but it needs to be used correctly,” says Clark. “I personally feel a responsibility to do that in the right way.” For example, in working with Amazon and Alexa to remotely authorize the delivery of a parcel to a home, concerns of security must be weighed carefully along with issues of convenience. “It’s important that we get the balance right,” says Clark. “We need to know the right person is giving the right voice command to lock a lock. We have to be true to our core as ‘security first.’” Will Yale be here another 175 years? Clark says she doesn’t expect to be around to find out but will do her best to preserve and promote the brand until she hands it off to a new caretaker.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail Solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent Video Analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognize threats, unauthorized access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete Security Solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Just a ten-minute walk from the city center, the University of Leeds is upgrading door security in much of its student accommodation to keep pace with changing technology and customer demand. One of the biggest and busiest centers of higher education in the UK, the university has more than 34,000 students and over 8,000 staff, making it the third largest employer in Leeds. With such a large student population to house, its residence portfolio both on and off campus is impressive. It ranges from the Victorian architecture of Lyddon Hall to modern purpose-built apartments such as Storm Jameson Court, through to shared houses and a huge choice of flats and apartments run in partnership with the likes of UNITE and iQ Student Accommodation. Wireless Electronic Access Control System The Residential Services team have chosen to upgrade their SALTO ProAccess management system to the latest versionStarting university is a really exciting time, and for many students it will be their first time living away from home so both they and their parents will want to know they will be living somewhere safe and secure. Starting in 2010, Residential Services swapped out its previous mechanical keyed system and since then has been using a wire free electronic access control system from SALTO across much of its student accommodation. This has proven reliable providing the versatility and efficiency to manage in excess of 1737 doors across the campus. But technology does not stand still, and many advances have taken place since the original installation. So, the Residential Services team have now chosen to upgrade their SALTO ProAccess management system to the latest version to take advantage of its increased functionality and features including the ability to use smart phones as access credentials. Benefits Of SALTO Solution Paul Carr, National Accounts Manager at SALTO Systems, says: “Our ProAccess SPACE Software is a powerful web-based access control management tool that enables users like the University of Leeds to program access-time zones, manage different calendars and view audit trails from each door. ProAccess SPACE Software's user-friendly web-based interface is simple to set up and configure" “Its user-friendly web-based interface is simple to set up and configure, giving them the flexibility and control they need. It balances security with accessibility, and advanced technology with affordability. By embedding such a high-performance electronic access control solution into their infrastructure, the University can protect people – both students and staff – as well as their assets and buildings. Problems With Key Access Control System “Student accommodation for instance, whatever shape it comes in, is usually busy with people moving from bedrooms to and from various facilities in and around the building. That means a lot of events for doors to deal with. If a room key is not handed in when one student leaves, is the room secure for its next occupant? If a key has been lost how do you cancel it and know the room is truly secure without changing out the lock? And regards to that lost key, has it been copied? “And for audit purposes, on a campus such as Leeds with such a massive choice of accommodation, how do you get an accurate security overview when there are literally thousands of keys in circulation? This is where ProAccess SPACE and electronic access control really scores. “And now, with changing technology, more people want everything to be accessed through their personal device. That should come as no surprise as today’s students are digital natives and they expect convenience to come as standard!” Delivering Highest Level Of Security It is important that students are safe and secure and that access to their accommodation is strictly controlled"Simon Mulholland, Residence Refurbishment and Development Manager at the University of Leeds comments: “Living in University accommodation is a great way to experience student life, make new friends and feel part of our student community. We understand how important security is and it is a responsibility we take very seriously. It is important that students are safe and secure and that access to their accommodation is strictly controlled. “The SALTO system we’ve been running since 2010 now has proven track record with us so upgrading was a fairly straightforward decision and the latest version of the ProAccess SPACE software enables us to continue to deliver the highest levels of security combined with the most convenient and enjoyable experience of the learning environment – all as cost-effectively as possible. “Mobile credentials are an exciting application, after all when do you see a student without a smart phone, so this together with a number of other functions gives us enhanced productivity and control in a familiar but more powerful package.”
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof Cameras With Smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognize crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR With Data Protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing Security System Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Jutting up to a height of 126 meters, the 36-story Prime Tower is Zurich’s tallest building and number two in Switzerland. Its 40,000 square meters of floor space can accommodate more than 2,000 workplaces. It is striking with its futuristic architecture and dark green reflective exterior. The tower’s impressive details include a 10-meter-high entrance hall and the CLOUDS bar and restaurant on the top floor boasting an unmatched view far out across the surrounding landscape. Bosch Networked Security Solution The operator relies on Bosch to keep the building safe and secure. And to meet the Prime Tower’s unique requirements, the company’s experts recently implemented a modernization project. One of the new system’s technical highlights is a combination of electronic and biometric access control. “Our owner, the firm of Swiss Prime Site Immobilien AG, attaches great importance to monitoring who exactly is inside the building at all times,” explained Annika Hammes, who heads the trustee department at Wincasa, a building services outfit that was contracted to design and execute the solution. Electronic And Biometric Access Control Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands. This is done contactlessly for very easy, comfortable use. A total of 120 hand vein readers have been installed in the building and connected to the controllers of the eight elevators. Once employees and guests have been biometrically registered, they board lifts that automatically take them to the right floors. Encrypted ID cards are used to access the rental units, thereby making sure that people can only enter zones for which they have been authorized. All relevant security information is collected in a management system so that the responsible employees always have everything in view and can respond quickly when there is a need. Bosch handled everything for this project: advising the client, and then planning and implementing the system. The modifications were made without interrupting use of the building, which was a major challenge not only for the project team, which therefore had to work very swiftly, but also for the tenants themselves. “This called for very close cooperation between the Bosch team and the mixed-use site management (MUSM) team of Wincasa AG, which met the requirements for continued building use while the work was ongoing,” explained Hammes.
Omagh Hospital and Primary Care Complex opened in 2017, designed by Todd Architects has recently won Building of the Year – Public Award at the Building & Architect of the Year Awards. The complex presents two wards with 40 single in-patient rooms and aims to promote patient privacy and dignity whilst complying with the latest infection prevention and control standards. A further 22 recovery beds are available for patients recuperating from Day Case Surgery. Working with Building Protection Systems and the Primary Health Trust, Comelit Group created a solution to allow access to visitors after ‘normal hours’ when a Department or entrance is locked-down. Ability To Communicate There were many different elements that had to be considered carefully when researching how to effectively manage the hospital security systems" The main requirement was for combined Access and Intercom system to divert to a separate location and provide the same ability to communicate with the caller and release the door remotely. Clive Kinnear, Senior Manager – F&S Systems Sales At Building Protection Systems added: “There were many different elements that had to be considered carefully when researching how to effectively manage the hospital security systems. Not least to provide a welcoming and calming environment that supports patients, staff and visitor health and well-being.” “Any security technology must be strategically placed, unobtrusive and not affect the aesthetics. And it is with the intention of creating this balance Comelit Group really showed their true market leading ability in the sector, to understand our intentions and ensure the best, centrally managed door entry solution was installed throughout the complex.” Emergency Call Points The overall solution was the integration of an Intercom to communicate across the Trust’s IT Network. Door entrance panels were connected and the system programmed to ensure out of hours calls are automatically transferred. This covers main entrances to the building and also Car Parking Barrier Help Stations to assist with car park barrier issues. Comelit Group provided over 50 systems across the whole site, using both its renowned ViP and Simplebus system technologies Comelit Group provided over 50 systems across the whole site, using both its renowned ViP and Simplebus system technologies. A mix of Vandalcom and Ikall Entry panels were used, calling Icona Video monitors. A further range of emergency call points are located in the car park, all centrally managed and provided with a concierge unit facility and off site monitoring, using Comelit’s C-Bridge to connect to the South Western Area Hospital in Enniskillen. Integrated Approach Mike Campbell. Business Development Manager at Comelit Group UK concluded: “Providing security for hospitals involves more than the best choice of products and services – it also requires best practices and an integrated approach to ensure security incorporating door entry, safety and convenience.” “The adaptability of our ViP technology allowed us to work with the contractors to supply a high-¬quality system and offer greater flexibility and reliability. By installing this together with our flagship Simplebus solution, Omagh Hospital & Primary Care Complex can achieve maximum communication with no signal loss over the complete grounds. And this is on a 24 / 7 / 365 basis, including car park facilities, for the benefit and security of all staff, patients and visitors.”
iLOQ has signed an agreement with leading residental developer Bonava Finland Oy. Under the agreement, the majority of new buildings developed by Bonava will be equipped with iLOQ’s unique digital locking and access control solutions. The agreement is initially valid until the end of 2020. iLOQ will supply unique self-powered locking and access management solutions to buildings developed by Bonava“We are happy about the upcoming collaboration. The new agreement with Bonava shows that digital access control has made its way into new construction. Digital access management will replace mechanical locking in the future, and this is a change where iLOQ is at the very forefront. The agreement is also a strong indication of us reaching a point in our growth where we are more strongly present in the production of new buildings,” says Heikki Hiltunen, President & CEO of iLOQ. iLOQ will supply unique self-powered locking and access management solutions to buildings developed by Bonava. The agreement aims to increase collaboration between iLOQ and Bonava and makes iLOQ’s self-powered locking and access management solutions available to an increasing number of tenants. Digital Locking System For Tenants’ Security With iLOQ’s locking system, the tenant can move around the neighbourhood using a single key with access rights that can be modified"“This is a fine step for Bonava and provides a good starting point for future living solutions. Bonava wants tenants to be able to move around in their neighborhood easily and safely, which is possible with a digital locking system. With iLOQ’s locking system, the tenant can, for example, move around the neighborhood using a single key with access rights that can be modified. New lock series are not necessary if the key is lost and using the key also leaves a mark that makes it easy to track possible misuses,” says Kaisu Nousiainen, Head of Design and R&D at Bonava. “Digital locking and access management are strongly linked with the living of the future, and we are a pioneer in the digitalisation of the locking industry. People are interested in smart home technology. Digital development makes the everyday lives of tenants and other users significantly easier. Due to the collaboration, an increasing number of tenants are able to enjoy the security digital access management brings,” states Toni Päivinen, Head of Sales Finland at iLOQ.