Share911, a security technology company that offers critical communication solutions, announced that the company will be showcasing its collaborative mass notification platform at the ISC East Show in booth #1449. ISC East is the northeast’s largest security trade show and will be taking place at the Jacob Javits Center on November 20th-21st, 2019. The show boasts over 7,000 security and public safety professionals coming together in New York each year to meet experts from over 250 leadin...
Security Essen is continuing to consolidate its position as a platform for the security industry. Numerous companies have confirmed their participation in the leading international trade fair, which will take place at Messe Essen from 22 to 25 September 2020. Particularly pleasing: In addition to many long-standing customers, the registrations also include companies which will take part in Security Essen again for the first time after a break. Amongst others, Telenot and Securiton will present...
Johnson Controls is introducing the Ethos line of multi-tech contactless access readers from WaveLynx Technologies. Ethos readers are equipped with a choice of credential technologies, enabling customers to choose migration paths to deploy secure credentials. WaveLynx Ethos multi-tech contactless access readers feature a modern aesthetic and state-of-the-art feature set. All Ethos readers are capable of reading legacy Proximity credentials, MIFARE DESFire® smart card credentials, LEAF enabl...
After eight years as an Engineer in the Royal Australian Army, I briefly worked at Telstra before joining Honeywell Australia. In 2000 I moved with Honeywell to Europe, and in 2010 took a position at ASSA ABLOY. My current role is global CTO for the ASSA ABLOY Group. During my career I have developed extensive knowledge of the global residential and commercial security industry, and of all aspects of building automation. I have had responsibility for sales leadership, project and product manage...
Bates Security, LLC, a commercial and residential security company based in Kentucky with a branch in Jacksonville, is happy to announce the recent acquisition of Absolute Protection Team from Roger and Karen Marcil of Vero Beach, Florida. Bates Security will be maintaining that location as its second in the state and fourth company branch overall. With the acquisition, Bates will be adding over 2,000 customers to its customer base. "Roger and Karen built a nice and successful company and we are...
ELATEC USA Inc., a developer and manufacturer of innovative RFID products, announced Paul K. Massey as Chief Executive Officer. In this newly created position, Massey will report to the ELATEC Board of Directors and Managing Director Stefan Haertel. As CEO of ELATEC USA, Massey will focus on the growth and proliferation of ELATEC solutions in its North American and Latin American markets. Customer focused communicator “We are fortunate to have someone of Paul Massey’s calibre and...
The newest version of an iconic access control and site management system looks set to revolutionize, both, the operator and user experience. Gallagher Security has released Command Centre v8.10, the latest version of its site management software, with a range of features and enhancements that simplify and improve operation. Improvements to site plans reduce information overload for busy or complex sites by introducing progressive disclosure – the ability to zoom in to reveal more information. It is now easier to create a site plan that includes all floors in the building and easily navigate between them, while new site plan privileges provide greater control over the level of information operators are exposed to. Integration with IDEMIA MorphoWave Compact allows users to be identified with a wave of their hand. This high-level biometric integration delivers faster, more secure biometric access while simplifying the collection and management of biometric data and access rights, and preventing duplication and synchronization issues. Reducing cyber risk Gallagher’s Mobile Connect app can now be used to open both Gallagher and SALTO Bluetooth® doors with Command Centre v8.10. The SALTO credential has been combined with the Gallagher credential to retain a single mobile credential for each user in Command Centre. Using a single credential and app to open doors creates a simpler experience for users and is easier for operators to manage on a day-to-day basis. The newest release introduces car park management, making it easy to manage and configure parking allocation. Site plan functionality provides detailed oversight, ensuring car park spaces are used efficiently. Improvements to the Inbound Events REST API allow Command Centre to receive external events from third party systems to generate alarms, view alarm instructions, provide alarm indications on site plans, generate notifications, and run reports in Command Centre. This new release builds on Gallagher’s ongoing commitment to design and manufacture security technology that protects people, places, and assets across the world. Enhanced functionality As with all Gallagher version releases, a wide range of minor enhancements that improve existing functionality are included. Gallagher offers a software maintenance programme which provides customers the opportunity to upgrade to every new version of Command Centre as it is released. Adopting the latest technology as it is released helps ensure customers stay ahead of emerging threats and new vulnerabilities – reducing their cyber risk, enhancing system performance, and guaranteeing continued compliance with government standards.
National Security Inspectorate (NSI), the UK’s third party certification body for the security and fire safety sectors, was a proud sponsor of the 2019 Women in Security Awards which took place on 12 September, recognizing the significant contribution and achievements of women within the wider world of security. Organized by Professional Security Magazine and Patron, Una Riley, almost 250 security professionals gathered aboard the Dixie Queen riverboat on the River Thames to celebrate and honor the 15 finalists. Una, the first woman to own an NSI approved electronic security company, founded the Awards to raise the profile of women working in what is, a traditionally male dominated sector. This prestigious black tie evening is now firmly established in the industry calendar, attracting sponsorship from thirteen industry organizations. NSI would like to congratulate all of the winners and finalists selected from over 200 nominations by the pre-eminent judging panel. This year representatives from NSI approved/assessed companies featured as finalists in three of the five award categories: Security Manager: Janet Owens, Intu Uxbridge Frontline: Sara Stephenson – Sodexo (Winner) Wendy Tomlinson – CIS Security Samantha Askew – Sodexo Technical: Carly Taylor – Sodexo Contribution to Industry: Amanda McCloskey – CIS Security (Winner) auditors from guarding services Richard Jenkins NSI Chief Executive commented: “We were delighted to once again sponsor the Women in Security Awards, an event we have been closely involved with for a number of years. It was great to see so many members of the security industry gather to celebrate and honor the success of the Award winners and finalists who play such a vital role within our sector and communities. "This year NSI was pleased to support the event with a complement of attendees from our own team of women in security, including auditors from within guarding services and security systems. Our warmest congratulations to all of this year’s winners and finalists - we wish them continued success in their careers.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organizations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
The Open Security & Safety Alliance (OSSA), an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and building automation space, celebrates its one-year anniversary. Within its first 12 months, OSSA attracted 30+ members ranging from device manufacturers, software developers and system integrators to distributors and system on a chip (SoC) companies – helping lay the groundwork for improved security, safety, building automation and business intelligence solutions. Open security and safety ecosystem We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem" “Through OSSA, we have competing and complementary institutions reaching across aisles and stepping outside of their brands to work together to push our whole industry into a new, more prosperous and efficient direction,” said Johan Jubbega, President, Open Security & Safety Alliance. “We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem comprised of 30+ renown companies, and having a market-changing digital marketplace and first commercially available video security camera offerings underway for year two as the Alliance continues to provide guidance and interpretation of common standards and specifications to promote more intelligent, productive solutions for users.” Operation and maintenance of products Currently, security and safety solutions are fragmented and there is no collaborative approach to systems working together for bigger-picture success. Large amounts of data are left untapped in siloed systems that through cooperation can instead be utilized for better living, safety and security purposes. OSSA’s mission is to work with market players to all start from the same ‘recipe’ when it comes to the development, deployment, operation and maintenance of products, software and services. The Alliance’s vision is that the majority of the security and safety industry works with a common, vendor-agnostic operating system (OS) and IoT infrastructure – and agrees to implement or adhere to common approaches defined for common challenges like data security, privacy, product performance and easy consumption of data across multiple solutions. Collaborative digital marketplace They also started to define the common approaches and establishment of a shared IoT infrastructure This will substantially fuel usability and trust when it comes to security and safety solutions that are built on the foundations set forth by OSSA. From there, companies can differentiate through apps by way of a collaborative digital marketplace – similar to how we all access/download/use applications between an app store and our smart phones and other digital devices. Already within its first year, OSSA member companies created the first common Technology Stack specification including the definition of a common operating system for video security devices. They also started to define the common approaches and establishment of a shared IoT infrastructure, including a digital marketplace. This framework allows the trapped – and mostly unused – data captured by any brand of device to be unleashed and available for good purpose. It also reduces friction when conceiving, deploying and maintaining security and safety devices, systems and settings and inspires innovation by opening the doors to data interpretation and possibilities. This platform revolution that OSSA envisions will benefit everyone involved. Significant outputs from Alliance workgroups Significant outputs from Alliance workgroups over the past 12 months include: Documentation of a common Technology Stack including the definition of a common vendor-agnostic OS. First description of a common market approach to data security and privacy. OSSA member Security and Safety Things GmbH (SAST) realized a first version of its OS as set forth in the common Technology Stack defined by OSSA – enabling the creation of prototype cameras. Together with SAST’s first open app store for security cameras, various innovative applications were showcased this year from ISC West 2019, IFSEC 2019 and GSX 2019. The commercial launch of the platform is planned for Q1 2020. OSSA members fulfilled their first prototype cameras based on the commonly defined Technology Stack and OS, and showcased them throughout 2019 at ISC West, IFSEC and last week from GSX. Change for the betterment of the industry The Open Security & Safety Alliance’s five founding companies – Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ and VIVOTEK Inc – are joined by 25+ other inventive international players that currently comprise the OSSA member roster. The Alliance is designed to include everyone and offers membership levels to meet the needs of companies big or small. Benefits of joining OSSA include access to the Alliance framework and the ability to connect, discuss, influence and collaborate with other Alliance members to steer change for the betterment of the industry.
ABP Technology, a value-add specialty distributor for IP technology solutions, has obtained the exclusive rights to distribute AlarmReady™ in the United States. AlarmReady is the first universal alarm system video verification solution designed to frictionlessly attach to any IP video surveillance system. “AlarmReady is an exciting opportunity for system integrators to deliver a video verification solution – for any alarm system users may have – that enables higher situational awareness, faster emergency response, and fewer false alarms,” said ABPTech CEO Robert Messer. AlarmReady is a cloud-based solution designed for commercial buildings or higher-end homes. Its first delivery will be for MOBOTIX camera systems as a FREE beta feature included with MxLINQ™ – the cellphone universal viewer, alert, and control tool for MOBOTIX surveillance system end users. Immediate video access ActivitySensor technology helps eliminate false alarms and AlarmReady can quickly discern which cameras to show As soon as an alarm is activated at any monitored location the solution provides immediate video verification to users and owners or, if configured, to a compatible monitoring center. AlarmReady sends users alerts directly via phone, tablet, or computer and can send a text message to subscribed users to make sure the alarm is not missed. Users will see the location of the alarm as well as have immediate video access to the cameras on site that shows activity at that time. “AlarmReady together with decentralized intelligent MOBOTIX cameras and MxLINQ Cloud Access provides the highest situational awareness in the market,” said Messer. MOBOTIX-patented ActivitySensor technology helps eliminate false alarms and AlarmReady can quickly discern which cameras to show. MxLINQ, a cloud access solution for MOBOTIX, enables the user to immediately view and forward video footage to law enforcement – including a live-link by SMS or email – to the affected location. Powerful cloud-based platform AlarmReady is a flexible and powerful cloud-based platform that can be integrated with professional monitoring systems “People are nervous in alarm situations and AlarmReady simplifies this process and guides end users directly to the cameras they need to see,” said Messer. “AlarmReady provides additional situational awareness, user-friendliness, and overall simplicity of the system. Primary design factors give the end user as seamless an experience as possible.” AlarmReady can help prevent further harm or damage by enabling users to take a variety of actions via the MOBOTIX system. For example, users can play dissuasive Audio Messages. If set-up by a system integrator, users may also have access to turning on lights, locking doors, closing gates, or any other features on their IoT/surveillance system right then and there. This makes AlarmReady a flexible and powerful cloud-based platform that can be integrated with professional monitoring systems, offering end users and businesses a unique hybrid solution. Take a closer look at this exciting feature at the upcoming MOBOTIX Global Partner Conference in October in Mainz, Germany and Americas Partner Summit in January 2020.
Johnson Controls will exhibit security technologies and platforms that are helping to advance the safety, comfort and intelligence of spaces in order to power the mission of its customers at Global Security Exchange (GSX) in Chicago from Sept. 8 through Sept. 12. In booth #703, Johnson Controls will showcase innovative technologies that work together to construct connected, intelligent facilities in an “Integrated Smart Buildings Command Center.” Attendees will have an inside look into Johnson Controls integrated security, building controls, and life safety offerings that help to create safer, smarter and more sustainable environments. Create smarter, more integrated buildings “As we help empower our customers to create smarter, more integrated buildings, it is important for us to exhibit our solutions in a connected environment instead of having siloed displays,” said Hank Monaco, vice president, marketing, Johnson Controls, Building Solutions North America. “At GSX, we have traditionally demonstrated our security, fire and life safety technologies, but we are excited to also layer in our additional capabilities in building controls and data-driven solutions to reinforce how critical they are to the equation of more secure and intelligent spaces.” Johnson Controls Digital Solutions group will be highlighting the following solutions that work at the nexus of data and business to gather insights that allow for smarter buildings, increased efficiencies and new business value. Assurance Services helps deliver preventative service insights to maintain high availability of security assets Enhancing life-safety standards Connected Converged Security (CCS), a SaaS-based platform that provides proactive, holistic, and smarter security solutions, CCS is a hardware agnostic software solution that enhances health and life-safety standards while providing measurable results and a basis for superior decision-making. As a result, customers can save on operational costs and hardware spend, and improve their security return on investment. Assurance Services and False Alarm Reduction Service (FARS), both offerings analyze data to increase safety, streamline operations and decrease costs through actionable insights into a facility’s space and security considerations. Assurance Services helps to deliver preventative service insights to maintain high availability and reliability of security assets. When problems are detected, a remote resolution team can automatically resolve issues in minutes, rather than days. FARS analyzes and identifies alarm patterns to deliver to help reduce false alarms and their associated risks and costs. Identify false alarm triggers Athena Security sends authorities an alert, getting people to the scene faster with an up-to-speed video feed into what’s going onThe software leverages artificial intelligence and machine learning capabilities to identify false alarm triggers and help to stop the activities that trigger them. In addition, cutting-edge startups from Johnson Controls Open Innovation – a global innovation center in Tel Aviv, Israel launched to foster collaboration between the company, customers and the startups to deliver effective solutions worldwide – will be revealing emerging technologies, including: Indoor Robotics A smart robot that operates indoors after-hours to run security and inspection missions, follow up on alerts, detect leaks and fires, patrol the indoor space, learn the environment and respond to various anomalies detected. Weapons detection Athena Security offers a sophisticated AI-driven solution that utilizes existing security cameras to work to detect dangerous objects, such as guns and knives, in real-time. The platform sends the authorities an alert, getting the right people to the scene faster with an up-to-speed video feed into what’s going on and where. Evolv Technology, a fully automated high-speed concealed weapons detection solution, integrates firearm and explosives detection with facial recognition for early detection of unauthorized concealed weapons or persons of interest.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behavior that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-Line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organization,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realized the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behavior And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behavior. During training, Chubb emphasizes that ethics is about doing the right thing, all the time even if no one is watching.
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognizing gun threats Aegis AI offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Aegis AI. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Aegis AI. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Aegis AI helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Aegis AI with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Aegis mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Aegis is a software-only solution that plugs into security camera hardware and software, including VMSAegis' solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Aegis. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Aegis is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Aegis’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Aegis can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Aegis is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Aegis stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus solution is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defense for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognizing duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognizes firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritize responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Four networked MxPro 5 fire panels from global systems provider, Advanced, are now protecting one of Serbia’s most prestigious higher education facilities. The project at the University of Belgrade’s School of Electrical Engineering, involved installing a fire system to reliably protect lives and property while respecting the value and authenticity of its 1920s features. This meant overcoming various problems presented by outdated construction methods, inaccessible areas and high ceilings. 4-loop and 1-loop MxPro 5 fire panels Advanced’s partner in Serbia, TVI Ltd, was responsible for the design, installation, commissioning of the project Thanks to their performance, quality and ease of use, a network of three of Advanced’s 4-loop and one of its 1-loop MxPro 5 fire panels, including over 1000 Argus detectors, were chose to protect the entirety of this top educational and scientific institution, including the facilities of Civil Design, Mechanical and Electrical Engineering. Advanced’s local partner in Serbia, TVI Ltd, was responsible for the design, installation and commissioning of the project. Electrical Engineer, Radomir Kerkez, at TVI Ltd, said, “The flexibility of Advanced’s fire panels to adapt to sites both large and small is what makes us choose them time and time again. Advanced products make even the most complex installation challenges straightforward and we can always rely on them to deliver complete protection.” Multiprotocol fire system solution MxPro 5 is a renowned multiprotocol fire system solution and was recently certified to the EN 54 standard by FM (Factory Mutual). It offers customers a choice of two panel ranges, four detector protocols and a completely open installer network, backed up by free training and support. MxPro panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. MxPro’s legendary ease of installation and configuration plus wide peripheral range, make it customizable to almost any application. Building fire safety Our fire systems offer many ways to meet the challenges of protecting a building’s heritage"Vladimir Zrnic, Advanced’s Regional Sales Manager for Southern Europe, said, “Our fire systems offer many ways to meet the challenges of protecting a building’s heritage features while providing robust and reliable fire protection. It is great to see that potential put into practice in yet another successful and prestigious site.” Advanced, owned by FTSE 100 company - Halma PLC, has a long history of protecting some of Europe’s most notable and prestigious buildings, including Athens’ Stavros Niarchos Foundation Cultural Center, Istanbul’s Hagia Sophia and Sofia’s Sofia University. Intelligent fire systems firm Advanced is a globally renowned company in the development and manufacture of intelligent fire systems. The legendary performance, quality and ease-of-use of its products see Advanced specified in locations all over the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging and false alarm management systems.
SMARTair® Wireless Online access management has proven a simple, school-wide electronic solution for greater control and security at Westbridge. Each staff member carries one RFID credential card programmed with access rights personalized to their individual role. In an emergency, the school can institute a complete lockdown via the centralized system. “Having a SMARTair® system in place has given us peace of mind. It’s quicker, it’s safer and it’s simple,” says Joanna Brunton, Executive Officer at Westbridge School. The school’s teaching, administration and residential buildings require multiple layers of access control, for both staff and students. The inflexibility of a legacy mechanical locking system had presented facility management and pupil safety challenges for years.“With over 50 staff, we needed more subtlety in assigning access permissions, which you simply can’t do with a bundle of metal keys,” explains Joanna Brunton, Westbridge School’s Executive Officer. New access system The system would need to be installed over the holidays for minimal disruption to the school’s busy calendar Beyond replacing and upgrading outmoded, inflexible mechanical key security, Westbridge had a number of requirements for its new access system. Devices in the new, unified system would replace piecemeal mechanical locking on 80+ doors around the site. School leaders wanted access control already proven in the field, with a track record of successful installations managing access in schools worldwide. New electronic locks must provide a real-time audit trail, so facility managers always know which doors are opened by which staff cards. The new system would also need to work within the school’s security budget — and be installed over the holidays, for minimal disruption to the school’s busy calendar. "We essentially had a safety and security need,” adds Joanna Brunton. “We needed to be able to discourage students from going where they didn’t need to be on site or redirect a student who was in a heightened state from re-entering a classroom and potentially disrupting the class or causing damage.” Wireless and battery operated SMARTair® solution has done everything we wanted it to do in terms of safety, security and monitoring" System administration is easy even for non-specialists. “I taught staff how to use the software and encode access cards,” says Kylie Bray, director at Western Lock Services, who have long managed hardware maintenance for Westbridge. “If a staff member loses their card, you can go straight in and delete it." The intuitive SMARTair® system software can open or secure individual zones, connecting to individual locks via a network of 9 hubs. “We now have the ability to set higher security for specific areas of our site, especially over the school holidays when students have gone home,” says Joanna Brunton. “Our regular maintenance contractors have their own access keys, so they just get straight on with their work without calling us to meet them for access. This keeps our time, and their costs, down. SMARTair® door devices are wireless and battery operated. Because there’s no need to run cabling to individual doors, installation was fast and cost-efficient. From a facilities management point of view, the solution has done everything we wanted it to do in terms of safety, security and monitoring,” adds Joanna.
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralized time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralized attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralized time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralized report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrollment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualiszation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfill project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
The City of Boston is known for many things – from Fenway Park to the Boston Marathon to the bar from Cheers, the city is full of iconic landmarks, events, cultural assets, education centers, and more. Boston is also recognized for its vast history, especially downtown, where hundred-year-old buildings have been preserved or restored. There is also a mixture of new property development, including 33 Congress Street, in the heart of the financial district, which combines the best of historical design with new construction. Building security 33 Congress incorporates more than 400,000 square feet of office and retail space 33 Congress incorporates more than 400,000 square feet of office and retail space, transforming the historic neighborhood and positioning the area as a dynamic downtown destination. The project was designed by Arrowstreet, an award-winning architecture and design firm, and was led by Jason King, AIA, LEED, AP, BD+C, Senior Associate for Arrowstreet. According to King, the 33 Congress Street building consisted of three different structures that were built at separate times: in 1904, 1906, and in 1922 and then all combined into one space. While the space functioned as one building, there were three separate elevator cores, sets of restrooms, sets of stairs, and more. Those entities needed to be reconfigured into one. The most striking feature of 33 Congress is a new, modern glass and steel structure, containing 6 additional floors of office space that sits on top of the original three masonry buildings. Another important project goal was to upgrade the main lobby to a modern design that allowed public access, increased security for building employees, and respected several historical aspects. Secure access control “We needed a way to get people into the new, main elevator lobby quickly due to the high volume of traffic that we were anticipating would take place after the redesign,” King said. “We also wanted to create an entrance that would create a better flow of entry from the sidewalk into the building.” The original building had an existing revolving door, but it was small and surrounded by stone. “It was dark and uninviting,” King said. “We were creating an open and airy Class A lobby space and wanted visitors to clearly see the ornate, coffered ceiling and experience the grand and historic nature of the lobby as they entered.” Crystal TQ revolving door King implemented a Boon Edam Crystal TQ manual revolving door to lead visitors in the double height lobby space King implemented a Boon Edam Crystal TQ manual revolving door to lead visitors in the double height lobby space. The Crystal TQ is constructed virtually completely from glass with only a few stainless steel accents to ensure the solidity of the revolving door. It fits seamlessly with modern glass facades but can also be a beautiful eye catcher in more traditional or classic designs. For employee access, the building’s previous design did not incorporate turnstiles to the elevator banks. “The building did have card reader access, but only at certain doors and locations,” King said. Lifeline Speedlane Swing King installed four lanes of Boon Edam Lifeline Speedlane Swing optical turnstiles and two Winglock Swing model access gates to provide secure employee access to the building’s upper floors. The Lifeline Speedlane Swing turnstile manages and channels the flow of people entering and moving around buildings. It employs sensors that detect visitors approaching, with pulsing light strips to guide the user. A sleep function saves on energy use. It can be customized with dimensional and glass choices, including corporate identity colors or other options, so that it either blends-in or stands-out from its surroundings. Boon Edam Winglock Swing The Boon Edam Winglock Swing is constructed from stainless steel and a single glass panel The Boon Edam Winglock Swing is constructed from stainless steel and a single glass panel, and is unobtrusive in nature and design. The access gate easily manages bi-directional traffic, with LED lights that signal if the gate is in use or on standby. The access gate ties into a manned security desk located near the front doors. Employees gain access to the building through either the Lifeline turnstiles, or a Winglock Swing access gate, while building visitors can receive credentials at the security desk. Entrance solution King said, “We started the process looking at Boon Edam from a security and an aesthetic standpoint. We went through multiple product options but always had a Boon Edam product as the basis of the design. We have been happy with Boon Edam entrance solutions and we are planning to use them again for future projects.”
K9 Fuels are a family run, fuel distribution business providing an efficient and customer focused service in and around Lincolnshire. Since moving to their new premises on an industrial site, they weren’t able to leave their fuel trucks in the yard because of constant break-ins and theft. CCTV was installed but wasn't enough of a deterrent. Seeing a Gallagher monitored pulse fence at nearby TC Harrison, K9 Fuels wanted more information on how a similar system could benefit them. Monitored building alarm A simple stand-alone, four zone system linked to their existing monitored building alarm was installed. There is potential to upgrade this to a network based system, using the same F32 fence energizers, if the company expands. System height is 3.0m (32 wire), with a fence length of approximately 200 metres including one sliding gate and one double leaf gate. The break-ins stopped after the monitored pulse fence was installed and K9 Fuels are at ease knowing that their premises are monitored and protected 24 hours a day.
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?