Marks USA, a division of NAPCO Security Technologies, is pleased to announce the debut of Style by Marks new interactive website featuring customisable ArchiTech Access Control Locks and matching interior tubular locksets. Ideal for use with architects and designers, etc., who want their access control and locking ‘look’ to be as welcome as the security they provide, the website allows site-visitors to be the designer of their own custom locks and then easily spec and share it with...
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-co...
Vigitron, Inc, the manufacturer of complete networking solutions designed for security applications announces major new product releases for ISC West 2019. These products cover areas of PoE Midspans, Network Health Monitoring, Testing and Installation Tools, Building Infrastructure and Network Switching. Reliable And Cost-Effective Products “Vigitron continues to lead as a comprehensive source of networking solutions,” stated Neil Heller, Vigitron’s Vice President of Business...
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces that OpenGate Capital, a global private equity firm, has entered into an agreement to acquire S&G from Stanley Black & Decker. The transaction is anticipated to be completed in Q1 2019. Financial terms were not disclosed. Established in 2005, OpenGate Capital specializes in the acquisition and operation of businesses to create new value through operational improvement, innovation a...
Pivot3, a provider of intelligent infrastructure solutions, announces that it has named Rance Poehler as vice president of global sales and chief revenue officer. In this role, Poehler will be responsible for Pivot3’s global sales organization and executing on the company’s growth strategy and talent acquisition. Poehler joins Pivot3 from Dell Technologies where he served as vice president of worldwide sales for its cloud client computing team, an $800 million line of business that...
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Johnson Controls has entered into an agreement with CBRE, World Resources Institute (WRI) and Lawrence Berkeley National Laboratory (Berkeley Lab) to test and deploy an open-source, web-based energy analysis tool to identify energy efficient retrofit opportunities in commercial buildings. The initiative is part of the Johnson Controls and CBRE Innovation Lab, which was established three years ago to evaluate, connect and leverage products, services and energy data to create value for occupiers and investors of real estate. Retrofit Opportunities The initiative also supports the Building Efficiency Accelerator, a public-private collaboration that accelerates local government implementation of building efficiency policies and programs where Johnson Controls serves the role of co-convener along with the World Resources Institute. Berkeley Lab is working with Johnson Controls to automate and improve the LEAN energy analysis tool Johnson Controls developed the LEAN energy analysis technology over the past eight years and has used the tool to analyze retrofit opportunities in over 700 buildings. Berkeley Lab is working with Johnson Controls to automate and improve the LEAN energy analysis tool and create an open-source version of the tool for public use. CBRE will be an initial deployment partner, using the tool to help their enterprise customers target cost-effective energy efficiency retrofit opportunities across their real estate portfolios. Drive Greater Investment WRI will use the open-source tool to help local governments around the world target the best opportunities for retrofitting public and private buildings within their jurisdictions. “This is a big step forward in providing commercial, institutional and government building owners and managers with open-source, easy-to-use tools to target building efficiency improvement opportunities,” said Clay Nesler, vice president, global sustainability and regulatory affairs, Johnson Controls. “We believe this initiative will help drive greater investment in energy efficiency by turning readily available, monthly building energy consumption data into specific, cost-effective recommendations for improvement.”
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces the launch of a new Community Edition of its powerful software-based virtual Application Delivery Controller (vADC) to help application developers create innovative application solutions with dramatically lower costs and time to market. Pulse vADC Community Edition integrates easily with common DevOps tools for automated provisioning and orchestration, such as Kubernetes, Terraform, Puppet and Chef, making it easy to start building secure and scalable applications from day one. Launching New Applications Pulse Secure is setting the benchmark for try before you buy that competitors will have to follow" “Pulse Secure vADC Community Edition is a free, full-featured application delivery controller that can be used in production scenarios which allows developers and enterprises to accelerate cloud application deployment by removing the hurdle of procurement and tooling. Pulse Secure is setting the benchmark for try before you buy that competitors will have to follow,” said Mike Fratto, senior analyst at 451 Research. Developers can use the Community Edition for commercial applications up to a limit of 10 Mbps, and up to four nodes can be clustered together for high availability, for a maximum aggregate bandwidth of 40 Mbps. The Community Edition is ideal for building and launching new applications, and offers easy in-line upgrades for 24x7 support options and higher throughput to support global-scale applications. Powerful Graphical Analytics In addition, customers can upgrade seamlessly to Pulse Services Director for flexible capacity-based licensing, and centralized enterprise management features, including powerful graphical analytics with actionable insights, to help understand application behavior and to diagnose application problems on the network. “Our new Pulse Secure vADC Community Edition is a free-to-download, free-to-use, full-featured virtual application delivery controller (vADC) solution, which developers can use immediately to build smarter applications,” says Prakash Mana, vice president of product management for Pulse Secure. “Customers starting with the Community Edition can then upgrade to Pulse Services Director for enterprise management tools, flexible licensing, technical support and graphical analytics for on-demand applications.” Fully-Supported Platform Pulse Secure vADC Community Edition offers all the capabilities of the full product with the only limitations being those of scale and support" “Unlike other platforms that have a restriction on certain features within the ‘Free Edition’ – Pulse Secure vADC Community Edition offers all the capabilities of the full product with the only limitations being those of scale and support. Community Edition users still benefit from access to full documentation via the Pulse Community, and the option to migrate to a fully-supported platform or to scale up to higher throughput without the need for downtime,” Prakash adds. Pulse Secure vADC Community Edition is available in three ways. For container deployments, the software can be installed from the Docker Hub without a need to register, giving frictionless access for container and microservices deployment. Transparent Pricing Models Developers can use one-click access to the Community Edition via cloud marketplaces, such as Amazon AWS, Google Cloud and Microsoft Azure. Alternatively, downloads of the Community Edition are available from the Pulse Secure website, which offers the latest virtual appliance software images and access to full documentation. Our approach is to offer a low-friction option that is truly cloud-portable, allowing customers to migrate policies across multiple virtual and cloud platforms" “Our approach is to offer a low-friction option that is truly cloud-portable, allowing customers to migrate policies across multiple virtual and cloud platforms, so they are no longer tied to a specific cloud architecture,” says Prakash. “And unlike open source or other entry-level solutions, the Pulse vADC Community Edition includes full enterprise-grade capabilities such as an easy-to-use graphical user interface, global load balancing and web application firewall as an integrated part of the solution, with transparent pricing models for upgrades and flexible licensing.” Orchestration Platforms Also highlighting the benefits for Pulse Secure partners, Prakash commented: “Our Community Edition makes it easier for our channel to offer new types of solutions to application developers that can combine with additional tools and orchestration platforms such as Terraform and Kubernetes to streamline proof of concept projects which can move seamlessly to full scale production deployments.” “As online applications become more complex, more distributed and more virtualized, organizations need a broader set of tools to solve performance problems for their web-based services. With Pulse Secure vADC Community Edition, organizations have a simpler way to explore the potential of the software without compromising on the critical features that have become an important part of modern application platform development processes,” Prakash concludes.
The DC700G-FT Security Door Closer from the ASSA ABLOY Door Hardware and Access Control Group has been shortlisted for the Architectural Ironmongery (AI) Specification Awards. Organized by the Guild of Architectural Ironmongers (GAI) and the Royal Institute of British Architects (RIBA), the AI Specification Awards identify and reward excellence in the specification of architectural ironmongery in the construction industry. The DC700G-FT has been shortlisted in the category of ‘Product design and innovation’, which is a new award for 2019. Featuring a distinctive and stylish appearance that was launched earlier this year, the DC700G-FT allows any fire or non-fire rated door to be retrofitted with an electrical locking mechanism. Closing Force Requirements With no morticing or rebating required because the door closer, lock and wiring is all surface mounted, sites do not need to be concerned that the installation will risk a fire door’s certification, or create a lot of mess and disruption. In addition, the locking mechanism releases under its full rated load, so it is safe to use on escape ways, stair cores or final escape doors. The door closer also features Cam-Motion technology, ensuring the door is light to open while retaining its closing power The door closer also features Cam-Motion technology, ensuring the door is light to open while retaining its closing power. This ensures it meets both the opening force detailed in BS 8300-2:2018, as well as the necessary fire closing force requirements. This is in line with the Equality Act 2010 and Approved Document M and B. Additionally the DC700G-FT is CE Marked in all three mounting positions and independently tested for use on fire doors. Maintaining Security The winners of the AI Specification Awards will be announced on Thursday 21 March at the OXO2 in the OXO Tower building in London. Paul Johnson, Commercial Director at ASSA ABLOY Door Hardware and Access Control Group, said: “Buildings evolve and change over time, and nowadays the challenge is balancing any new requirements while maintaining security, escape routes and fire door safety. Our unique and innovative DC700G-FT door closer helps overcome these challenges, by combining Cam-Motion technology and an escape door strike all in one. This offers both smooth operation and reliable closing, with secure locking, whilst being fully certified.” “We are thrilled that our class leading innovation has been recognized by the AI Specification Awards. These awards truly represent the best that architectural ironmongery has to offer, providing a celebration of the finest work in the industry.”
With more than 50 percent of U.S. households projected to use smart home technology by 2023, Interlogix, a provider of security and life safety solutions, is ready with an array of security platforms that support smart devices and links to top interactive service providers. Interlogix is a part of Carrier, a provider of innovative HVAC, refrigeration, fire, security and building automation technologies. “We’re uniquely positioned to meet the demands of the smart home segment that’s expected to nearly double over five years,” said Michael Chiavacci, general manager, Interlogix, North America. “Our flexible, integrated hardware platforms offer a variety of connected, smart devices that seamlessly integrate to proven service providers.” Enhance Lifestyle Convenience Interlogix has reinvested in its UL-listed, professional-grade, security panel lineup and added two touchscreen controls. In addition, it is providing access to more device integrations – such as sensors, lights, locks, thermostats and garage door controls, video doorbell cameras and voice-controlled digital devices, among others. Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality" All of these systems can be managed or monitored via a single smart home app. For example, new devices such as the Interlogix Command Button, enhance lifestyle convenience by wirelessly triggering up to three different, simultaneous automations within the home. “Our range of platform and service solutions make Interlogix a smart choice,” said Chiavacci. “Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality if their needs grow and change.” Encrypted Wireless Communication Interlogix solutions are professionally installed and configured through a nationwide network of security and smart home dealers to ensure each home has a customized solution that fits each homeowner’s needs. Many of these solutions will be displayed at the 2019 Consumer Electronics Show (CES). Booth visitors can preview a new line of door and window sensors, key fobs and pet-motion detectors that provide encrypted wireless communication between devices and select control panels. See many of the Interlogix solutions for home security and automation on display at the Pepcom Digital Experience, Jan. 7 in the Mirage Hotel and Jan. 8-11 in booth #40531 at the 2019 CES in Las Vegas.
Aiphone, the international manufacturer of intercom and security communication products, announces the next generation of video intercoms has arrived with the IX Series 2 Peer-to-Peer Video Intercoms. The new intercoms offer Session Initiation Protocol (SIP) compatibility, enhanced CCTV control, line supervision, backwards compatibility with the original IX Series and many more features and benefits to help create safer buildings with increased system flexibility. End users can create more efficient security operation centers (SOCs) using the IX Series 2 system as a single command point to control a variety of security layers. SIP Compatibility The IX Series 2 can page across multiple stations with general or emergency announcements and scan through video intercoms and CCTV cameras to monitor locations. There’s no break in security with the IX Series 2. New door, master and emergency stations can tie-in to a SIP IP PBX server to forward calls to an external phone number, such as an off-site call center. SIP compatibility allows the IX Series 2 master station to be used as a telephone, replacing VoIP phones and helping to clear desktop clutter. The IX Series 2 intercom system can more quickly and accurately assess situations with a new picture-in-picture feature The IX Series 2 intercom system can more quickly and accurately assess situations with a new picture-in-picture feature. Master stations can view images from an associated ONVIFÒ Profile S CCTV camera and close-up images from the 1.2-megapixel IX Series 2 camera. Emergency Situations With the optional CCTV camera arm on Aiphone emergency towers, users can quickly toggle between the CCTV camera image and the intercom’s eye-level video feed to better assess emergency situations. And there’s confidence the system is functioning as intended with line supervision and device check allowing for scheduled or manual health checks of all stations and their individual components. A clear visual alert indicates when a station is offline so staff can respond to the situation quickly. “The new IX Series 2 is designed for almost any budget yet packed with features our customers have told us they want and need,” said Dana Pruiett, Aiphone’s marketing manager. “The performance and flexibility of the IX Series 2 makes it ideal for virtually any video intercom installation.” Individual Communications Needs Other benefits of the IX Series 2 include: Zero annual licensing fees for intercom features. Users save money while avoiding repetitive, sometimes forgotten costs. No added server costs. As a peer-to-peer solution each IX Series 2 station acts as its own system — a PoE network drop is all that’s needed. That also means there’s less equipment to maintain and if one station goes down, the others are unaffected. Future-proofing an organization’s security investment. The Aiphone IX Series 2 stations are compatible with existing IX Series systems and will be compatible with future IX Series generations. Scalability. The IX Series 2 can start with a single door and master station then expand as needs change or a business grows. This flexibility ensures the system will continue to meet individual communications needs. Along with the arrival of the IX Series 2, Aiphone has become a Cisco Certified Partner, further showcasing its expertise in specific network architectures and solution areas.
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioral analytics to IoT devices, detecting anomalies and preventing their compromise. “Manufacturing customers are using IoT to retool their factory floors, creating smart production lines that report their health and operational efficiency. One benefit of this approach is that customers can proactively perform preventative or predictive maintenance on machines to avoid costly production outages,” said Prakash Mana, Pulse Secure’s vice president of product management. Remote Access For Service Technicians PPS dynamically profiles the network to discover, classify and apply policy to IoT devices, and includes a built-in IoT device identification library“Our latest Pulse Secure release helps customers not only secure the smart factory floor, but it also helps streamline their maintenance activities by giving service technicians remote access to the equipment they maintain. Regardless if they are on the factory floor or in their remote office, our Zero Trust Security limits technician access to the equipment they maintain and requires that they use secured end-user devices to perform their work.” Pulse Policy Secure (PPS) is an integral part of Pulse Secure’s combined VPN and NAC solution that provides corporate networks with Zero Trust Security through visibility, ‘comply to connect’ policy enforcement and security orchestration with popular network and security infrastructure. PPS dynamically profiles the network to discover, classify and apply policy to IoT devices, and includes a built-in IoT device identification library. The solution also integrates with Next Generation Firewall (NGFW) solutions to provide identity and device security state data, as well as to fortify micro-segmentation to isolate and manage IoT devices on enterprises networks. Provisioning IIoT Devices To NGFWs The latest Pulse Policy Secure release helps customers protect factory floor system integrity by providing technicians secure remote access" PPS 9.0 extends the Zero Trust Security model to IIoT devices used in smart factories and buildings, with blended IT and OT environments. It automatically discovers and profiles IIoT systems, such as factory floor SCADAs, PLCs and HMIs, or office building HVAC systems, providing dynamic visibility and securing them by enforcing policies for local and remote access by authorized users and contractors. PPS 9.0 also automatically provisions IIoT devices to next-generation firewalls (NGFWs) to facilitate remote access without provisioning overhead. “A top priority for manufacturing customers is complete visibility and security of IIoT devices on smart factory floor environments. Because failing systems may lead to loss of revenue or human life, customers must emphasize rapid remediation of machines to avoid system outages,” said Tony Massimini, Frost & Sullivan Senior Industry Analyst, Information & Network Security. “The latest Pulse Policy Secure release helps customers protect factory floor system integrity by providing technicians secure remote access. New Behavioral Analytics features also safeguard against attacks by detecting anomalous activity.” Preventing Attacks By Detecting Anomalous Activities The new PPS 9.0 IoT support provides practical relief for the frequent and costly issue of factory floor equipment outagesThe latest release of PPS also provides sophisticated behavioral analytics that alert security teams of anomalous IoT device behavior and automatically requires added factors of authentication. PPS 9.0 builds baseline behavior profiles for managed and unmanaged IoT devices utilizing information correlated from multiple sources such as NetFlow, user and device data. With these profiles, the platform detects anomalous activity, malware infections and domain generation attacks, allowing security teams to be more responsive to threats and take pre-emptive measures before attacks succeed. The new PPS 9.0 IoT support also provides practical relief for the frequent and costly issue of factory floor equipment outages. Aberdeen recently reported that 82 percent of companies reported unplanned downtime in the past three years, which can cost a company as much as $260,000 an hour. Authenticated Remote Secure Access The resulting downtime breaks production and lowers profit, because factory floor repairs often take days when security requirements mandate that service technicians physically visit the factory to diagnose and repair the problem. The latest PPS release works seamlessly with Pulse Connect Secure to solve the problem in an innovative way. These IIoT networks help our customers gain real-time system diagnostics, reduced downtime and overall lower operational costs"The combined NAC and VPN approach enables IT teams to grant remote secure access—authenticated and encrypted—to support contractors for expedited repair and return to service of factory IIoT systems for greater uptime and productivity. IT teams ensure security with remote zero-trust access via auto-provisioned NGFWs, and by enforcing security policies that authenticate contractors based on their technician role, endpoint device status and authorization to work on the targeted IIoT device. Real-Time System Diagnostics “Some of our customers operate among the manufacturing and transportation industry’s biggest and most distributed internet-connected device deployments. These IIoT networks help our customers gain real-time system diagnostics, reduced downtime and overall lower operational costs,” said Kirk Hanratty, vice president and chief technical officer at IT security and solutions company SynerComm. “For these and other customers, IIoT drives their business where assuring availability and secure access throughout an IIoT infrastructure is paramount. We have found Pulse Secure’s platform to offer our customers the usability, interoperability and reliability necessary to support large scale IIoT applications.”
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While using a PIV card for logical access has been largely successful and compliant with HSPD-12, implementing PIV-based, physical access control systems (PACS) has been much more difficult to conquer. As a result, HSPD-12 compliance for PACS has largely eluded the Federal Government. The noncompliance reasons are many, but there is now hope for fully achieving HSPD-12’s mandates. Interoperability With Any Agency’s PIV Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planetAll Executive Branch employees and long-term contractors, including the entire Department of Defense, have been issued PIV cards. This has been true since 2013. Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planet. It seems so simple, where employees/contractors previously used their proximity card to open a federal facility door or go through a turnstile, they should now be able to use their PIV card. However, HSPD-12 took the PIV requirement one step further – compliant PACS must be interoperable with any agency’s PIV. This introduced an entire magnitude of additional complexity. A compliant, interoperable, PIV-based PACS should work like this: an authorized employee (or contractor) presents a PIV card (contact or contactless) to a card reader to enter whichever federal agency building they have reason to be. Over the last 14 years, in all but a very few cases, the lack of PACS’ HSPD-12 compliance has prevented this from happening. Secure Credential Policy Today, less than 1% of the Federal Government’s PACS are HSPD-12-compliant. At most federal facilities, especially those outside the National Capitol Region, a noncompliant PACS works like this: an authorized employee (or contractor) presents a proximity (‘prox’) badge to a proximity card reader to enter his or her agency’s facility. At the fraction of federal facilities with upgraded PACS that work with PIV cards, virtually all such PACS fail to properly use a minimum number of PIV security features before granting access – let alone interoperate with a PIV card from any other agency. Active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 complianceNew federal initiatives frequently suffer from having no policy to enforce their roll-out. That isn’t the case with PACS compliance. Policies have been in place for so long that newer policies like Office of Management and Budget (OMB) M-11-11 (February 3, 2011) remind everyone what the policies said in 2004 and 2006. This year, OMB publicized its proposed OMB M-18-XX (Draft), which will replace M-11-11. OMB M-18-XX’s (Draft) main PACS thrust is, once again, to ensure that everyone understands what the Federal Government’s secure credential policy is. It hasn’t changed since 2004. It would be tempting to say that PACS technology isn’t mature, but that isn’t the case. In 2013, the Federal Government revamped the PACS portion of the FIPS 201 Evaluation Program and, since that time, all PACS on the General Services Administration’s (GSA) Approved Products List are 100% compliant and interoperable. Yet, on any given day, active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 compliance. The usual suspects, policy and technology, are not the culprits for this epic delay. An authorized employee presents a PIV card to a card reader to enter whichever federal agency building they have reason to be Difficulties In Adopting HPSP-12 Compliance For PACS Standards – The Federal Government’s approach to standards is to avoid a great deal of specificity. It’s an unspoken tenet that federal standards must be flexible, promote innovation and avoid disadvantaging any participating market segment. The opposite is true if your goal is interoperability: nearly every detail must be specified. Consider the standards-based success story of chip-based credit cards. When was the last time you used a credit card and it didn’t work? Interoperability failures are nearly unheard of. If you look at the hundreds of volumes of technical specifications that cover minute aspects of every component in credit cards and payment terminals, you quickly realize why it works so well. Nothing is left to chance, nothing is a variable, and there is no optionality. The Good News: Work to increase viability through deep scrutiny has progressed in recent years. The GSA APL PACS Testing Lab, set up in 2013, annually tests credentials from all PIV issuers against all GSA-approved PACS. This testing has significantly reduced interoperability failures at federal facilities. Collaboration – In the past, physical access practitioners from federal agencies rarely collaborated, unlike their logical access counterparts. This is also true for PACS procurement decision-makers across agencies and facilities. The Good News: In 2018, an agency trend has emerged where finally physical access, physical security and IT practitioners have begun sitting down to discuss their shared responsibilities. We have already begun to see coordinated budget requests between IT and Security with enterprise architectures positioning PACS as an enterprise service on the network Scale – The Federal Government owns so many buildings that they can’t be counted. Google doesn’t know how many there are and neither does any one government official. Variability – A significant percentage of facilities have unique aspects making a one-size-fits-all approach infeasible. The Good News: Mature consulting services can now help agencies marry federal requirements with their unique environments to develop robust PACS enterprise architectures. As we see this occurring more and more frequently, a repeatable, achievable, systems-based upgrade of all PACS may be on the horizon. The GSA APL PACS Testing Lab annually tests credentials from all PIV issuers against all GSA-approved PACS Provenance – In many cases, different groups own different parts of a single facility, not all of whom might be subject to, or wish to interoperate with, a high-assurance compliant PACS. For example, GSA manages facilities for Legislative and Judicial tenants who aren’t subject to HSPD-12. Policy dictates that GSA manage the PACS for the front doors of these facilities should be HSPD-12-compliant, despite the fact that these tenants likely don’t have credentials that work with this technology. Sure, these tenants could commercially obtain a PIV-I credential, but almost none have. Economics – It’s difficult for agencies to create their annual security budget requests when HPSD-12 PACS upgrades are in scope, because so many unknowns exist at each facility. To assess the cost, the time to complete, and the facility’s existing equipment inventory, it would be logical for an agency to hire a contractor with PACS expertise to perform a site assessment. Having to do capital planning for an assessment phase in advance of making the annual budget request for the PACS upgrade creates a never-ending cycle of delay. Especially at agencies with multi-year capital planning requirements. Many agencies, trying to avoid this delay cycle, have fallen prey to doing site assessments themselves. This results in their integrators doing their walk-throughs after the contract is awarded. This is the leading cause of PACS upgrade cost overruns. Dependence on the agency’s IT department – Historically, PACS have been deployed on dedicated networks and are rarely ever connected to the enterprise, let alone the Internet. High-assurance PACS that validate credentials from other agencies must now communicate with many different systems on an enterprise network and over the Internet – so much so that the Federal Government reclassified PACS as IT systems. The Good News: With collaboration increasing between Physical Security Officers (PSOs) and Chief Information Officer (CIOs), we expect this to improve in due course. Resistance to change – This is a classic human factors challenge, and it’s a big one. PSOs have spent decades achieving their positions. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted. When the value proposition is clear, change is adopted more readily. But security value isn’t easily measured or observed. It is often said that the best performance review for a PSO is to note that nothing happened. And when something does happen, it is necessarily kept quiet so the risk can be remediated without calling attention to the vulnerability in the interim. To date, the value proposition of moving to PIV-based PACS has been entirely based on policy (without corresponding funding in most cases) and through the shock value of white hat hackers, showing how easily most proximity badges can be cloned. This is not the stuff of change agents. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted Are These Challenges A Unique Situation? No, these PACS challenges are not unique. Cybersecurity initially faced many of the same challenges that federal PACS face today. By 2000, the Federal Government recognized its urgent need to improve cybersecurity practices across its computing infrastructure and issued many policies that required agencies to improve. Improvement was sparse and inconsistent. GSA Schedules were set up to help agencies buy approved products and services to assist them, but this too produced lacklustre results. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned a system Congress enacted the Federal Information Security Management Act of 2002 (FISMA) (now amended by the Federal Information Security Modernization Action of 2014). FISMA mandates an Authority To Operate (ATO) accreditation process for all information systems. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned (vs. purchased) a system. FISMA and ATO accreditation has been highly successful when implementing new systems. These cybersecurity requirements are the closest thing that the Federal Government has to the ‘PIV Police’ today. However, the PIV requirements in FISMA and ATOs currently apply to only logical access for information systems. The proposed OMB M-18-XX (Draft) mentions that a FISMA PACS overlay to NIST SP 800-53 is forthcoming. The intent of the PACS overlay is to use the army of ATO accrediting officials in the Federal Government and enable them to assess implemented PACS as fit for purpose. This is the first time an enforcement approach has been brought forward that could reasonably succeed. How Long For HSPD-12 Compliance? We know that it won’t take another 14 years to achieve HSPD-12 compliance. Pockets of compliance are popping up. Compliant procurements do exist, and the state of PACS across the Federal Government is better in 2018 than in any previous year. Progress to date has been at a constant rate. The question is: what would take for progress to occur at an exponential rate instead? A major attack or compromise involving PACS would certainly hasten upgrades, but let’s hope that’s not the solution. The energy distribution sector has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The energy distribution sector, under nearly constant Advanced Persistent Threat attacks, has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The potential threat exists for Federal Government facilities as well. Looking into the federal PACS-compliance crystal ball, we’re beginning to see the faint outline of a multi-faceted campaign of education, budgetary oversight and accreditation of PACS that will ultimately see us past the tipping point. Consider though, at the current rate of PACS enablement, a 50% compliance rate is still far in the future. When that day arrives, the PIV card form factor may no longer be the key that fits that future lock. (Are you already using a mobile device’s Bluetooth interface to open the door to your office building?) Taking decades to perform a technology upgrade is the aging elephant in the room no one talks about. By the time critical mass is achieved with an upgrade facing these many challenges, there are typically compelling reasons to start over again with the next generation of technology. That cycle may well prove to be the Federal Government’s biggest PACS challenge of all.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred Safety Measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instill a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick Thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organization in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace Violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labor Statistics. This shows an obvious lack of preparedness from organizations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency Plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organizations are not communicating plans with newer employees or even that organizations that employ a significant number of millennials might not have plans in place at all. Affecting Everyday Work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass Text Messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organizations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organizations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness Plans What remains important for organizations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organizations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
As buildings become more complex and smarter, the age-old traditional maintenance methods that are based mostly on hands-on human monitoring are becoming more and more inadequate. Instead, the world is fast adopting building automation as a key component of smarter and more proactive maintenance strategies. The aim is to free up maintenance staff and give them time to focus on other tasks while machines monitor the different systems that work together to make the facility functional. Specifically, Internet of Things - or, IoT - enablement appears set to transform the way facility managers deliver service to building occupants. The trends are many and the possibilities are almost mind-boggling, from inventory management, to work scheduling and energy efficiency, the list goes on and on. Below, we look at a few ways in which IoT is being used for Facility Management and Security. Revolutionize Maintenance Through Condition-Based Maintenance For years now, the norm among maintenance professionals has been a time-based approach, or in simpler terms, performing maintenance operations after a set period of time. But a major flaw of this system is that components were being replaced periodically whether the parts were actually worn out or not. Of course, that meant some of these maintenance activities simply weren’t cost-effective. To avoid this waste from continuing, a subset of IoT known as IIoT can now be used to optimize the maintenance process. IIoT works as a centralized network of connected systems and devices that can talk to one another and generate and relay data Rather than changing parts on a time-based schedule, IIoT works as a centralized network of connected systems and devices that can talk to one another and generate and relay data. Selected equipment are fitted with sensors that monitor specific operational parameters and let maintenance professionals know how the machines under supervision are working, understand their current condition, and then pinpoint the optimum time they need to be maintained. The information generated this way is vital as it allows maintenance staff to intervene just in time to avoid costly downtime and other associated inconveniences. This is, in a nutshell, the basics of predictive maintenance and condition-based maintenance. These days, by implementing condition-based maintenance, IIoT is being used to effectively monitor a wide range of systems such as lighting, HVAC, fire suppression, security, etc. The applications are numerous and so are the benefits. On page 52 of this guide by the US Department of Energy, they state that a functional predictive maintenance program could yield up to 10 times ROI, reduce maintenance costs by 25% to 30%, and reduce downtime by 35% to 45% Along with fire suppression, IIoT is effectively monitoring a wide range of systems such as lighting, HVAC and security Remote Monitoring Of Facilities Physical inspections have been a critical condition for the success of conventional maintenance programs, even in hazardous environments. But, with the increasing emphasis on personnel safety, organizations want alternative solutions that allow staff to examine assets without being physically present. Facility managers and their team working in industries like manufacturing, oil and gas, and mining can relate with these constraints. And these industries can benefit greatly from deploying predictive maintenance solutions. For example, in the oil and gas industry, IIoT sensors can be used to monitor remote and highly critical assets. These sensors can be used on pipelines to detect anomalies (especially corrosion) and pass that information to supervisors for necessary action. By doing this, potential failures are quickly predicted to avoid often disastrous incidents. Managing Energy Consumption Sensors are also being embedded in building components and devices like HVAC systems, lights, doors, windows to understand energy consumption and proactively manage it. Facilities that use this technology could achieve substantial energy savings. In a press release by IT research and advisory company, Gartner, they stated that IoT can help reduce the cost of energy - as well as spatial management and building maintenance - by up to 30%. Looking at HVAC systems very closely, we see that they are a major source of energy usage in any building These sensors work by monitoring different conditions in the building and causing a power-saving action based on the data received. For instance, occupancy sensors can order lights to turn on when it senses motion in a room and then turn off the same lights when there is no presence there. That way, there is no need to wait for someone to remember to switch off the lights when they are not needed. Another very common use is in HVAC monitoring. Looking at HVAC systems very closely, we see that they are a major source of energy usage in any building. So, the issue is how can one use IIoT to manage HVAC and possibly reduce their energy usage? Well, in its most common form, IoT-enabled HVAC works as a connection of sensors and thermostats that monitor factors like indoor air quality, temperature, and environmental changes then communicate with the rest of the HVAC equipment and make needed adjustments for occupants’ comfort. Not only that. IoT-enabled HVAC works as a connection of sensors and thermostats that monitor factors like indoor air quality, temperature, and environmental changes The Technology Can Be Configured To: Track energy consumption at different distribution points throughout the building. Track usage from the power source right down to the consumption point. Detect sudden voltage drops or spikes (usually an indication of some fault). These are essential benefits because HVAC units are notorious for consuming large amounts of energy when they are working inefficiently. Security And Access Control Smart surveillance is another important area of application for IoT in facilities management. It takes several forms such as the monitoring of life-saving systems like intruder or fire alarms, invisible barriers, and other safety installations. Facility managers are using IoT across different industries to obtain live information about potential emergency situations with a view to responding before the issue escalates. In such cases, quick detection of any strange activity is key because many of these installations have tangible negative effects when they fail or when they are intentionally sabotaged.Smart surveillance is another important area of application for IoT in facilities management Fortunately, the surveillance equipment can also be setup to send alerts to cellphones to aid emergency response or evacuation as the case may be. Smart surveillance is also priceless for monitoring the situation in partially or fully automated remote facilities (especially oil and gas installations and mines), and in hostile environments with critical equipment where humans cannot work for extended periods of time. If you are not yet using IoT in your facility, you may be wondering where to start from. To avoid getting overwhelmed, a good place to start would be to try a small-scale deployment of this technology then review its ROI and impact on your operations before adopting a more widespread IoT implementation. This way you can gradually scale up as you and your staff come to understand and adapt and to this new way of doing things.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, N.Y., would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smart locks and building automation. This year, ASSA ABLOY is marking the 175th anniversary of the Yale brand. Global home security brand “People all over the world trust the brand to protect what they love most in their homes,” says Kate Clark, Managing Director of Yale EMEA at ASSA ABLOY. Although Yale has a successful commercial sector business in the United States, in the rest of the world Yale is a residential brand. The Yale brand is well known in 130 countries from Australia to the Czech Republic to Colombia, and is popular in Africa, too. In the EMEA (Europe, Middle East and Africa) market alone, Yale has around 20,000 products; that’s without counting products sold in the Asia-Pacific and Americas regions. Yale is familiar as a generic term for “lock” in some areas and is one of the largest home security brands in the world. Expansion Into Digital Locks Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand “I think we stand for safety, quality and reliability, and that hasn’t changed,” says Clark. “It’s as important now as ever. We have tried to pioneer new technology in the industry, new innovations. The rate of acceleration has increased, and there are so many technologies we have to understand and work with.” Growing beyond its heritage in mechanical locking systems, Yale is now expanding into digital locks that can protect homes with a high level of security synonymous with the Yale brand. The current selection of locks includes partnerships with tech brands such as Nest Labs (Google) and Alexa (Amazon). There is a rapid acceleration of growth in the electro-mechanical lock market. But even as the focus expands to smart locks and partnerships with tech companies, Yale continues to dedicate time and resources to the design of their core mechanical products. Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand. Yale padlocks and bike locks also keep the name top-of-mind. There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. Beyond Mechanical Locks And PIN Codes “It’s important for people to know that we have been around a long time, and we want to celebrate that,” says Clark. “It’s a fantastic story around the brand and what we have achieved. Internally we have a lot of people doing a lot of great things with the brand. We inspire people working with the brand and show them that this is the pedigree, and it should be cherished. We are also raising awareness among younger people, so they know that we are still relevant.” We have an obligation to show people that the new technologies are just as secure as mechanical locks" There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. “We have to take people on a journey,” says Clark. “We have an obligation to show them that the new technologies are just as secure as mechanical locks. If we eliminate PIN codes, we have to do it in a secure and safe way. Then suddenly access to your home can be made available by a company you trust.” Smart Home Security “We have a responsibility to do our best job with the new technology – it’s wonderful, but it needs to be used correctly,” says Clark. “I personally feel a responsibility to do that in the right way.” For example, in working with Amazon and Alexa to remotely authorize the delivery of a parcel to a home, concerns of security must be weighed carefully along with issues of convenience. “It’s important that we get the balance right,” says Clark. “We need to know the right person is giving the right voice command to lock a lock. We have to be true to our core as ‘security first.’” Will Yale be here another 175 years? Clark says she doesn’t expect to be around to find out but will do her best to preserve and promote the brand until she hands it off to a new caretaker.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that Utrecht University in The Netherlands has installed a custom-made, TQM manual revolving door at the entrance to the school’s newest addition, the Viktor J. Koningsberger building, dedicated to the faculties of Geosciences, Science and Medicine. Renowned Rotterdam-based architects, Ectory Hoogstad, were asked to create a building at Utrecht University that would serve as an addition to two other existing buildings: the Minnaert building and the Buys Ballot building. The new entrance had to be functional and recognizable, but also belong to the story of the building as a whole"Joost Ector, Director and Project Architect, explains, "All buildings had to be combined into one educational center for the science faculties. We solved that very simply by making a kind of 'loop' on the first floor; a circuit that runs through all the buildings. A new building has been added on the corner, and that is what has become the Koningsberger building. Through the 'walk', all buildings are now connected, and the students can easily walk from one building to another.” Functional And Aesthetic Entrance The central themes in the design of this iconic building are lightness, openness and transparency. These properties are reflected in the façade and play an important role at the main entrance. "Of course, we want you to be able to enter the cluster of buildings from all sides of the campus easily,” says Ector. “So the new entrance had to be functional and recognizable, but also belong to the story of the building as a whole. You walk down to the building, make that little turn through the entrance and then you suddenly see that the big atrium going up a hundred times. We just love that!" TQM Manual Revolving Door Once we decided to go with a manual revolving door, there was obviously only one name that stood out - and that was Boon Edam"When it came to selecting the entrance to the new building addition, Ector said his choice for the revolving door came naturally. “Once we decided to go with a manual revolving door, there was obviously only one name that stood out - and that was Boon Edam. We knew that Boon Edam made premium products and was capable of doing what we needed when it comes to these kinds of custom-made solutions. We came to our final solution after close consultation with their experts." The TQM manual revolving door installed at the Koningsberger building is nine meters (29-1/2 feet) high and is constructed almost entirely of glass. Nine-meter high rotating parts were not desirable, so a different solution was chosen. Installing Illuminated Cylinder A special tall, illuminated cylinder was installed above the revolving door for an impressive and recognizable appearance. "Our inspiration were old houses, such as canal houses,” explains Ector. “There is sometimes a kind of 'lantern' incorporated in the skylight above the front door in these old-fashioned homes. We utilized this in the TQM revolving door. “The cylinder was pulled upwards, and an illuminated element was manufactured. This constructed feature can be seen from both the outside and inside and serves as a beacon of light in the evening to help guide and locate the entrance.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Control and instrumentation specialist, CMR Philippines, has won undisclosed contract to supply and install advanced building management, CCTV and fire detection and alarm systems at one of the South East Asia’s pharmaceutical manufacturers. The work, undertaken at Unilab Pharmaceuticals’ new oral medicines and capsules Delta Amherst plant production plant in Laguna, Binan, sees the design and installation by CMR of facility-wide Siemens Apogee BMS, Siemens Cerberus FDAS and Hikvision CCTV systems. Comprehensive Package The advanced computer-based BMS system will be used to control and monitor the 22,000 sq. ft plant’s mechanical and electrical installations and equipment such as ventilation, lighting and power systems. CMR is also providing engineering and testing services as part of a comprehensive package of technical support CMR is also providing engineering and testing services as part of a comprehensive package of technical support, which covers the installation, programming and commissioning of advanced CCTV and FDAS capabilities. The systems will provide improved safety and security for Unilab employees working at Laguna as the manufacturer looks to expand its capabilities through new investment in state-of-the-art manufacturing and production facilities. Critical Operational Requirements Unilab produces a wide range of prescription and consumer health products covering all major therapeutic segments. Many of these products are sector brands across the Philippines, Indonesia, Thailand, Malaysia, Singapore, Hong Kong, Vietnam, and Myanmar. Rojel Rivera, general manager at CMR PH, said: “We are a valued and trusted supplier to Unilab and other regional manufacturers, providing cost effective and precision engineered system-based solutions.” “We are building a strong reputation as a first-class supplier to customers such as Unilab, who are looking for technologies to meet critical operational requirements, alongside high levels of reliability and performance in demanding production environments.”
Interphone, the security systems and building technology integrator, completes an advanced project for Ardmore Construction at the high-profile Sutton Point development, a vibrant new community at the heart of the London Borough of Sutton. The company was appointed to design and install the integrated security systems, which includes fibre infrastructure, BPT door entry, PAC access control, IP-networked CCTV and an IRS communal aerial system with SKY Q. The installation has been recognized by the UK Outstanding Security Performance Awards (OSPAs) with Interphone nominated as a 2019 finalist in the Outstanding Security Installer category. Fibre Backbone Network The Interphone project team took the decision to move to fibre infrastructure to improve performance “Through the effort and commitment of our team the project was successfully completed on-time, within budget, and to the highest possible standards notwithstanding design changes in the building along the way, which required modification to our own design and approach to aspects of the installation,” explained Albert Dwek, Sales Manager at Interphone Limited. In particular, the Interphone project team took the decision to move to fibre infrastructure to improve performance and ensure it could deliver a high-specification security system. As a result, the company created a fibre backbone network, which allows CCTV images to be viewed in true 1080p/4k without compromising any other components of the system. Responsive Working Relationships Interphone worked closely with services engineers QuinnRoss Consultants Limited throughout the project. Michael Keenleyside, Electrical Engineer at Quinn Ross commented: “We pride ourselves on our ability to deliver the best possible service and solution for each of our clients, so it is essential to have highly responsive working relationships in place with key technology partners.” “Interphone was flexible and adaptive throughout the design and installation phases of the development, which ensure that any changes to system requirements were handled quickly and efficiently. Their team’s knowledge, understanding and commitment was essential to the success of the project.” The sophisticated CCTV solution incorporates a site-wide, IP-networked camera system and full-perimeter PTZ (Pan Tilt and zoom) camera system from HIKvision. Greater Compression The full-perimeter system runs in real-time over three towers, three remote stations and two virtual concierge points with interlock ability The full-perimeter system runs in real-time over three towers, three remote stations and two virtual concierge points with interlock ability. The external PTZ camera images, recorded onsite, are also shared with the local police. This means the management company can keep the site secure for its residents, while allowing the police to protect the area in and around the development against crime. The PAC access control system enables all management tasks related to the tenants and staff to be administered from the central computer as and when required, ensuring the highest level of security around the site and added peace of mind. Meanwhile, BPT’s XIP door entry system offers significantly greater compression, providing the clearest and highest quality AV currently available, even with the significant background noise. Building Communications The added PCS concierge facility also has improved switchboard software performance, delivering full control of building communications at two desks, so the system will never be engaged and never miss a visitor call. The primary focus when designing this project was the delivery of a system that could expand to meet changing requirements" “The primary focus when designing this project was the delivery of a system that could expand to meet changing requirements. As a result, we have implemented a system that not only uses the most up-to-date technology, but by its design, has been future proofed with the ability to grow. Therefore, the developer can meet all its internal requirements and ensure high levels of security for residents, visitors and members of the public,” commented Dwek. Technical Capabilities David Dobouny, Operations Director at Interphone Limited added: “We are committed to the highest levels of service delivery. This project was selected to demonstrate our technical capabilities covering access control and CCTV systems for our NSI accreditation. We achieved a grade A rating, with zero faults and no negative comments regarding on-and off-site documentation, design and installation. This is a fantastic achievement for everyone involved, especially considering the size of the project.” Sutton Point is a large-scale mixed-use scheme located close to the town center. The high-profile development included the full demolition of an existing tower, and the design and construction of 332 one-and two-bedroom apartments, prime three-bedroom penthouses, 21,000 square feet of retail space, 18,000 square feet of office space and an 80-bedroom hotel.
STANLEY Security, one of the most trusted names in the world of security, has installed an intruder alarm system at Wraps & Tints’ new premises, which houses high value vehicles. The system not only protects the contents but also meets the insurance company’s needs, keeping everyone happy! Based in Leyland, Lancashire, Wraps & Tints is the North West’s Paint Protection Film, Vehicle Wrapping and Window Tinting installers. The company has gone from strength to strength and recently moved into larger premises to meet customer demand and to better represent the quality of the service with a smarter, more professional working environment. Provide Certification With supercars and high-end vehicles occasionally stored, and to meet insurance requirements, an intruder alarm system was requisite within the new premises. After initially employing a small, local security company to undertake the job who were unable to provide the certification needed by Wraps & Tints’ insurance company, Jonathan Burke, Director of Wraps & Tints, approached STANLEY Security. The system incorporates dual technology detectors, door contacts and roller shutter contacts, interconnected and fed back to a control panel Following a risk assessment of the building content and the building’s fabric and structure, STANLEY Security installed a hard wired Texecom intruder alarm system to Grade 2 (low to medium risk). The system incorporates dual technology detectors, door contacts and roller shutter contacts, interconnected and fed back to a control panel. A maintenance contract is in place with STANLEY Security to ensure the system remains fully functional. Highly Skilled Technicians Jonathan is pleased with the outcome, finding the system easy to use. He’s also happy with the service he received, which was ‘straight forward and efficient’. Ultimately, the new intruder alarm system has enabled him to cost-effectively meet his insurer’s requirements and to focus on his business with the peace of mind that comes from knowing his property and its contents are well protected. STANLEY Security provides security services to a wide range of organizations. Its SME division offers high-quality business security systems regardless of the size of office, building, store or facility. All installation work is handled by a team of highly skilled technicians, each of whom is locally based across offices located across the UK.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access Management System The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable Access Solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved Student Experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring Access Cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating Business Value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring Partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”