Campus security systems
AOPEN, a global technology company that specializes in smart products and services for cloud-based applications, announces the launch of the AOPEN Heat Finder Thermal Imaging Solution − a dual-camera system that quickly and accurately detects elevated body temperatures. "With so many industries facing unique, unprecedented challenges, thermal imaging technology has become more important than ever," says Aaron Pompey, President, AOPEN Pan America. "The new safety-conscious consumer ex...
Creative Realities, Inc., a renowned provider of digital marketing solutions, announced a reseller program to support broader distribution of its Thermal Mirror solution. CRI moved quickly to anticipate and meet the growing need for thermal screening solutions as businesses resume normal operations following the COVID-19 shutdown. Since introducing its Thermal Mirror solution several weeks ago, CRI has expanded its partner program to make its thermal screening solution more broadly available. T...
As educational pioneers continue the challenging conversation about what the new normal will look like for students across the nation, Allied Universal®, a security and facility services company in North America, is helping school administrators and campus safety departments plan and prepare for students returning to school. Allied Universal’s more than 7,500 campus Security Professionals safeguard nearly 700 schools/universities nationwide. Over last several months, Allied Universal&...
On Tuesday, June 9, 2020 at 2:00 PM Eastern Time (US & Canada), Genetec, together with Université Laval, one of the top research universities in Canada, and Axis communications will host a webinar that will look at: The importance of on-campus video surveillance and current trends in the education industry The areas of interest within a school setting that require surveillance and the considerations schools must take when implementing solutions Analytics, hardware, and software t...
Rhombus Systems, a cloud physical security platform, announces a strategic partnership with global real estate investment management company CA Ventures, through which Rhombus Systems will provide CA with a video security platform for multifamily and student housing communities. The platform will be capable of supporting an unlimited number of cameras and locations from one console – fully accessible from any web browser or mobile device. “The real estate sector has been going...
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announced the release of a new podcast, “Scalable Security: Wrong Decisions That Cost You Money.” In this podcast, JC Powell, Vice President of Sales, and Brian Marshall, Regional Sales Director, discuss how security professionals can understand the three levels of security entrance capabilities, and how they fit best into an overall physical security strategy. JC and Brian also share how they have se...
Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19). Hirsch Velocity Software with Contact Tracing is a means of proactively and reactively protecting visitors. If a person enters a building and is later found to be symptomatic of an illness, Velocity can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. The feature is free, easy to download, and simple to implement into existing Velocity physical access control system (PACS) platforms. Manage access control While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza" “While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza,” said Mark Allen, Identiv GM, Premises. “This means your office can be proactive in responding to potential outbreaks, while simultaneously providing your employees with the peace of mind that there are measures in place to keep them safe.” Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry-level packages. Velocity is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses with the most stringent security compliance. Prevent unwanted access With Velocity, users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitor behavior, prevent unwanted access, maintain compliance, and provide a robust audit trail. The latest version of the software platform is designed to deliver the highest level of security, interoperability, and backwards compatibility, and it accommodates the evolution of security technology.
In the new normal, differently and hygiene is something that will play a greater part in one's lives. That’s why SALTO Systems, in partnership with BioCote® the anti-microbial technology supplier, has since 2011 incorporated anti-microbial silver ion technology in the electronic smart lock range, electronic cylinders, locker locks, and supporting devices such as wall readers. The addition of BioCote’s anti-microbial technology helps reduce microbes on door handles and improves hygiene in buildings creating a cleaner, more hygienic environment for both users and visitors. “The more hygienic the handle set, the less chance of cross-contamination. This helps to reduce the spread of microbes around a building as microbes are not transferred from door to door and surface to surface,” comments Aznar Sethna, CSMO SALTO Systems. “We have long seen and offered the benefit of having BioCote® added to our electronic lock products to contribute to customers’ existing cleaning and hygiene regimes.” Silver-ion technology for anti-microbial protection BioCote® has successfully tested against a feline strain of coronavirus, showing a reduction of 90% in two hours, which is a positive indicator of the antiviral properties of their technology. Previous testing has revealed that BioCote® delivers 99.9 percent, 24/7 protection against an array of microbes including Influenza A H1N1, E.coli, Salmonella, and antibiotic-resistant CRE, VRE, and MRSA. BioCote® cannot be wiped or worn away and thus enhances hygiene management and reduces the possibility of cross-contamination. SALTO BioCote® anti-microbial protection consists of silver-ion technology which is integrated during the manufacturing process. SALTO added BioCote® as a standard additive for all the plastic devices it produces as well as with the new XS4 Locker Lock BLE. SALTO also offers BioCote® as an option on its complete line of electronic locks and online wall readers. Lasting hygienic protection from BioCote®-treated hardware The finish is long-lasting and maintains its anti-microbial performance over the expected lifetime of the products "Our findings continue to show the positive impact of having anti-microbial coatings on our smart-locking product range with regards to reducing levels of bacterial contamination. BioCote® silver ion technology significantly reduces the level of microbes on SALTO escutcheons and door handles by up to 99.99 percent which is an incredible achievement,” says Sethna. The finish of BioCote®-treated smart door lock hardware differs slightly from that of standard-finish escutcheons due to the mix of lacquer and silver ion particles. On wall readers, locker locks, and lock readers, it's invisible. The finish is long-lasting and maintains its anti-microbial performance over the expected lifetime of the products. Integrated and lasting hygienic protection Current government guidelines recommend regular cleaning to minimize the spread of microbes in all types of building. However, beyond regular cleaning, little consideration has been given to alternate or non-traditional methods for limiting the potential for cross-contamination within a public environment. By effectively reducing a broad spectrum of microbes by up to 99.9 percent, BioCote® anti-microbial technology provides integrated and lasting hygienic protection that supports regular cleaning regimes and hand hygiene. “SALTO has been an innovative leader in electronic access control technology for two decades and we are just as proud to have been equally as advanced when it comes to the hygienic properties of our products with a leading partner like BioCote®,” said Sethna.
To limit the spread of COVID-19, many governments, municipalities and enterprises world-wide are introducing new health and safety measures to ensure that all entrants to public buildings are screened for above average temperatures. In response to these new measures, Pangea, a global supplier of digital identity and security solutions is announcing the integration of thermal imaging technology as part of its biometric access control and incident management solution. The thermal imaging technology implemented by Pangea, was first introduced during the SARS outbreak in Asia in 2002 and enables security personnel to scan a continuous flow of people entering a public space or building. Thermal Imaging Access Control technology is faster and more suitable for the movement of masses of people as it does not require people to stop and line in line while their temperature is taken. Thermal imaging technology Biometric and Thermal imaging technology initiatives have been implemented as part of South Korea’s response to COVID-19, helping the country to ‘flatten the curve’. South Korean government ministries have been working together using a ‘Coronvirus Data Hub’ to provide accurate data about those infected by COVID-19, which has helped manage the spread and reduce new incidences of COVID-19. South Korea’s experience shows that “diagnostic capacity at scale is key to epidemic control,” says Raina MacIntyre, an emerging infectious disease scholar at the University of New South Wales, Sydney. Automated thermal imaging technology This technology offers a non-intrusive, non-contact solution for controlling the spread of viral infections “Our Geriatric Hospital serves residents with a high risk of contracting COVID-19,” said Deborah Goldberg, Head Nurse, Beit Hadar Geriatric Medical Center. “The installation of the Pangea Bio-Thermal Imaging Access Control solution gives us and our residents another solution for protection against the virus in these troublesome times.” For Pangea, a company with over 25 years’ experience in the deployment of complex large-scale digital identity and security projects, the integration of automated thermal imaging technology is an obvious next step. This technology offers a non-intrusive, non-contact solution for controlling the spread of viral infections in large-scale public spaces including office buildings, shopping malls, educational campuses, sports arenas and cultural centers. Security infrastructure solution For the enterprise organization, Pangea can integrate these digital heat sensors with other corporate digital security mechanisms such as biometric face recognition to create a more robust security infrastructure for corporate facilities. “The outbreak of COVID-19 has changed the world and is expected to have a significant impact on our daily lives, today and in the future,” says Rafi Kaminer, CEO and founder of Pangea. “We think government and enterprise organizations need to take on a new “social role and responsibility” to keep people safe from potential COVID-19 individuals who may infect others." "In Israel, only Pangea has the expertise and technology to help public and private sector organizations roll out an automated bio-thermal imaging solution as part of our broader safety and security infrastructure solution for any type of facility, at any scale, anywhere in the world.”
Sielox LLC has further expanded the integration of its vast access control and emergency notification solutions with Allegion US to include the new enhanced Schlage NDE wireless lock featuring an Interior Push Button (IPB) which can easily lock a classroom door from the inside. Sielox is the first to complete the integration to include this new generation of Schlage NDE wireless locks, providing schools with enhanced security and greater control in emergency situations. Schlage NDE Wireless Lock Schlage NDE wireless lock with interior push button lock provides a fast, easy way to immediately secure a classroom door" “The new Schlage NDE wireless lock with interior push button locking capability provides a fast and easy way to immediately secure a classroom door from the inside in the event of an emergency situation,” said Karen Evans, CEO and President at Sielox, adding “This new integration further capitalizes on the inherent benefits wireless and WiFi locks provide for advanced networked access control systems.” Designed to meet the pressing demand for expansive school security nationwide, the new Schlage NDE mobile enabled wireless lock benefits schools in a variety of ways including: New Interior Push Button (IPB): Expands the way the lock operates to include storeroom, office and privacy functions. It allows students and faculty inside a classroom to simply lock the door with a push of a button, restricting access only to privileged card holders or first responders Advanced encryption and communication security: Provided at lock and as part of the larger system Ease of installation: Fits mechanical Schlage ND door prep with minor modifications for new DPS (Door Position Switch) Same price, with major upgrade: The list price is the same as the legacy NDE lock, while offering upgraded features including IPB Advanced access control and security “Allegion consistently looks for ways to deliver innovation and continuous improvement for end users and integrators, so we’re excited to expand integrations with Sielox and bring this to market,” said Mark Casey, Director of Commercial Electronic Sales at Allegion, adding “Schlage NDE mobile enabled wireless locks are ideal for schools that want an affordable, interoperable solution that offers advanced access control from the inside-out, for added protection during crises, when advanced security measures are needed.” Prior to this latest collaboration with Allegion, Sielox was first-to-market integration with networked Schlage locks and Von Duprin devices providing Over Network Reprogramming (ONR) firmware updates via Sielox’s popular 1700 Controller. Sielox also previously integrated its flagship Pinnacle Access Control Platform and Schlage NDE wireless cylindrical and LE wireless mortise locks to provide remote control and management of doors using a facility’s existing WiFi infrastructure, dramatically reducing installation costs.
Nutanix, a provider of enterprise cloud computing, announced that it has been named by Gartner, Inc. as a 2020 Gartner Peer Insights Customers’ Choice for Hyperconverged Infrastructure. This is the second year that Nutanix has been recognized as a Customers’ Choice. “At a time when many organizations are struggling with the day-to-day realities of running a business remotely, we are continuing to focus on our customers by delivering an IT infrastructure that is invisible and automated, allowing teams to focus on more immediate business needs,” said David Sangster, Chief Operating Officer at Nutanix. Subscription-based software licenses Being recognized as a Gartner Peer Insights Customers’ Choice for Hyperconverged Infrastructure is a great honor" “To us, being recognized as a Gartner Peer Insights Customers’ Choice for Hyperconverged Infrastructure is a great honor, and only strengthens our commitment to deliver cloud computing solutions that are flexible, simple, resilient and adaptable to customers’ changing needs, including widespread remote work.” Nutanix hyperconverged infrastructure (HCI) integrates compute, virtualisation, storage, networking and security, making tasks like deploying a virtual desktop environment much easier and faster. Something that would take weeks with legacy IT, can take just hours with Nutanix. Portable, subscription-based software licenses deliver valuable flexibility so IT infrastructure is no longer coupled to specific hardware devices and configurations, which could be critically important in situations where the global supply chain is impacted. Hyperconverged infrastructure space This Customers’ Choice recognition is based on detailed feedback from 68 customer ratings in the past year across multiple vendors in the hyperconverged infrastructure space. Nutanix has 301 reviews since the market began to be tracked within the Gartner Peer Insights platform and holds an average score of 4.7 out of 5. Nutanix customers said: Can Handle Complex Data Center Workloads Across All Industries "We have fully implemented our Nutanix platform here. The staff at Nutanix have been very helpful from helping us plan our implementation to providing us with solution architects to help us through solving how to incorporate some of our challenging gaming software pieces." - Database Administrator in the services industry High performance storage and virtualisation services Nutanix Enterprise Cloud Platform Review "Nutanix is clearly making IT jobs easier due to its capacity of virtualisation, compute and storage. Well I have to say, not only for IT, also for the company since it reduces cost a lot! The platform delivers scalable high performance storage and virtualisation services. Giving us the tools to upgrade our VM in a very easy way and basically with the same price. Something that would be really hard to do in a regular environment because we have to think in many factors before doing it. " - Computer Engineer in the services industry The Best Hyperconvergence Infrastructure Of All Time "The best hyperconvergence infrastructure, I have used for several years helping us manage our entire virtual environment and at the same time monitoring the services and something very important maintaining the continuity of the business since it is composed of nodes that share their resources and this is shown as a single resource say disks, memories, CPU and other resources found in each of the nodes." - System Operator in the healthcare industry Create new products and integration Easy Implementation And An Ever Growing Product "The product and professional services exceeded our expectations. We are still using VMware with Nutanix, but the swap from the traditional 3-tier system to Nutanix was simple. We used professional services as well, but after having them onsite, I think we could have gone without them it was that easy to setup. The product works great, it's easy to navigate, and it's pretty intuitive. Nutanix continues to innovate and create new products and integration." - IT Manager in the finance industry Easy Installation And [An] Awesome Growing System "It's a complete 100% software defined beast that works well. We have not had any issue[.] I still have yet to see something not working." - Network Engineer in the education industry Resilient cloud software solutions Customer focus is one of Nutanix’s core tenants, and the commitment to delighting customers is recognized in the company’s average net promoter score of 90 over the past six years, as well as the 97% customer retention rate as of the end of the second quarter of fiscal year 2020. As many companies are gearing up for remote work, Nutanix continues to deliver intelligent, easy and resilient cloud software solutions, along with excellent customer service, to its nearly 16,000 customers worldwide, including nearly 880 Global 2,000 customers. The company’s flexible and scalable hyperconverged infrastructure solutions deliver the flexibility, scalability, and performance needed during these uncertain times, along with the easy deployment and management Nutanix products are known for.
IPVideo Corp. announces that it will be releasing new product features for their HALO IOT Smart Sensor that will provide security for privacy areas. The new award-winning features of the HALO IOT Smart Sensor include spoken keyword alerting, gunshot detection and masked signature identification. These new features will be available through HALO’s firmware 2.0 update. Individuals under duress can now utilize a spoken keyword to send instant alerts to security for help in privacy areas that cannot have a camera, areas like bathrooms, hotel rooms, patient rooms, dorm rooms, locker rooms, dressing rooms, apartments, et al. Machine learning capabilities To help diffuse situations, the alerts can also trigger an audible message Thousands of incidents still occur in these places each year and needed privacy laws maintain their vulnerability, until now. Now a daughter in her dorm room, a hotel housekeeper, a patient under duress, a student in a hazing incident or your elderly parent living by themselves can alert security to an attack or emergency situation in real- time by shouting a keyword like ‘HALO HELP’. The audio is still not being recorded maintaining privacy, but the alerts are automatically sent to security for immediate response. To help diffuse situations, the alerts can also trigger an audible message that an emergency has been declared and security has been notified. Another new feature is the addition of machine learning capabilities to establish audible level ‘normalcies’. Masking signature identification Advanced gunshot detection audio analytics can trigger a facility lock-down and an emergency call response via the integration of third-party security applications when detected. In advancing HALO’s vape and THC detection capabilities, a new ‘masking’ signature identification has been established. All these new features will be available for download via the new firmware 2.0 Individuals who are trying to mask their vaping activity with aerosols will now be flagged with the unique signature identifiers. All these new features will be available for download via the new firmware 2.0 at no additional cost! This 2.0 release will also now support HTTPS, IPV6 and wireless connectivity allowing for a greater number of third-party integrations. Saving significant time And the addition of the HALO Device Management (HDM) tool to manage and push updates and threshold adjustments to all the HALO’s on your network. This tool will save significant time for those IT and Security managers who are using hundreds of HALOs across their campus. “These new features are a game changer for the security industry which did not have a good solution in place for privacy areas.” states David Antar, President of IPVideo Corporation. “We are constantly looking to bring new features to better protect our citizens and I am very pleased that we were able to include these great new safety and technical features at no additional cost to our customers.” HALO IOT Smart Sensor and the 2.0 firmware updates are patent pending.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus solution is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defense for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognizing duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognizes firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritize responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Recycling Lives is a very special business. Ostensibly a recycling and waste management operation, they actually use this commercial element to support and sustain charity programs for offender rehabilitation, residential support and food redistribution. It’s a genuinely effective approach to social aid, and one that has earned four prestigious Queens Awards and numerous admirers, including Andy Moore, managing director of security and fire experts ADJ Fire & Security Limited. ADJ works with Recycling Lives to provide technology-based solutions to minimize risk at its sites. Residential accommodation “The whole company’s called Recycling Lives, because that’s what it does,” Moore explains. “It gives people a second chance, people who have come out of prison or who are homeless, and they help them back into society. It’s providing help to people who really need it, by giving them jobs and if necessary rehoming them if they need somewhere to stay until they get their own place. They’re a special company, definitely. ADJ is extremely proud to be associated with a company like Recycling Lives.” Recycling Lives has sites across the UK was founded, and is run, by second generation recyclers, time-served experts with a wealth of industry knowledge, insight and contacts. Their charity and social enterprise teams provide residential accommodation for the homeless, help to reduce reoffending and redistribute food, directly supported by recycling, recruitment, compliance and waste management businesses. As a result, they create more than just environmental and financial value from their activities: they provide significant social value too. Thermal imaging technology Specialist cameras are designed to detect even minor changes in temperature using thermal imaging technology At the Recycling Lives site in Preston, on Longridge Road, ADJ was asked to help devise a solution which could help the Recycling Lives staff prevent and detect fires on-site during and out of office hours, explains Moore. “These fires can happen within waste piles on site, and can end up burning inside without any notification,” he says. “They can seriously flare up when the pile is disturbed. There are batteries stored on site from depolluted cars and these can also be a serious fire hazard if ignited.” ADJ Fire & Security is a Hikvision Gold VASP partner, and works closely with Hikvision to devise intelligent and efficient smart technology-driven solutions for its clients. In this case, ADJ, Hikvision and Recycling Lives collaborated on the development of the ideal system for Recycling Lives’ specific requirements. ADJ recommended the use of Hikvision’s Thermometric thermal bullet cameras, specifically the DS-2TD2136T-15 model. These specialist cameras are designed to detect even minor changes in temperature using thermal imaging technology. Fire detection and alarm function The camera uses cutting edge image processing technology, including Adaptive Automatic Gain Control, Digital Detail Enhancement, 3D Dynamic Noise Reduction, and a Noise Equivalent Temperature Difference of less than < 40mk. The thermal imaging module provides 384 x 288 resolution, a high sensitivity sensor, and supports contrast adjustment Its powerful behavior analysis algorithm enables automatic smart detection including Line Crossing, Intrusion, and Region Entrance & Exit, and it also provides a reliable temperature exception alarm function and advanced fire detection algorithm. Temperature measurement range is -20℃ to 550℃ with ±2℃ accuracy. The thermal imaging module provides 384 x 288 resolution, a high sensitivity sensor, and supports contrast adjustment and shutter adjustment in various modes. There are 15 palettes of adjustable color available, and because this is a thermal imaging camera rather than a conventional CCTV device, there’s no need for additional lighting. Nineteen thermometric cameras were installed initially at the Preston site, with more set to be added in future. Prevention and early detection of fire “Cameras are located in the high-risk areas where fires could break out such as the plant rooms and stockpiles, shredder, and depollution areas,” Moore says. “When the cameras detect an increase in temperature that signifies a potential fire risk, they automatically raise an alarm and alert the client to the issue. That allows them to take action much more quickly than relying on traditional video or other forms of fire detection – they can react immediately even to the risk of fire breaking out.” Recycling Lives compliance manager Dave Gallagher says: “The prevention of fire, and early detection of any fire that may break out, is of critical importance to protecting our people, infrastructure and the local environment. While our risk controls have proved effective year after year, the opportunity to invest in new technology that enhances our ability to react fast in the event of an emerging fire hazard was one that was not to be missed.” Commercial properties fire safety The results have been tangible, Moore says, and have impressed some influential people. “Recycling Lives recently had a visit from the Environmental Agency as part of a routine inspection,” he says. “The EA were impressed with the standard of risk management and controls on the site, including the recent investment in fire detection technology. As a result, the EA Director of Regulated Industry was invited to site to view the systems in place.” The success of the Preston solution has prompted Recycling Lives to engage ADJ to implement similar systems, over time, at all their other sites across the country. Dave Gallagher says: “We’ve been impressed with how ADJ Fire & Security Ltd and Hikvision have worked collaboratively with us to identify how the technology can best be employed to reduce risk and look forward to the enhanced protection the system provides. ADJ Fire and Security Ltd are adaptable, commercially aware and completely comprehend the commercial realities of the scrap metal industry. They are reputable, reliable and respected by local authorities and institutions and moreover, they are a pleasure to work with.”
The new Student Center at Columbia College Chicago, located at 754 South Wabash Avenue in Chicago, opened its doors in the fall of 2019. This brand-new building offers five spectacular stories of spaces for students including music and film-screening rooms, dining options, a fitness center, a reflection room for meditation and prayer, and event spaces for meetings, performances, and receptions. According to Andy Dutil, Director of the Columbia College Chicago Student Center, the school has taken the initiative to improve overall security, with the intention of keeping an open feel to the campus. Speedlane open turnstiles To help meet that objective at the new Center, the architects designed the building with Speedlane Open turnstiles and a TQM manual revolving door from Boon Edam. Columbia College Chicago has a closed campus. In order to enter any building on campus students and staff must have a Columbia ID or visitors must have a valid appointment. The main entrance at the Student Center is the TQM revolving door that leads to a public foyer that includes a coffee shop and lounge. Guards watch as people pass through them to ensure that everyone is scanning their IDs Since the turnstiles are just past the security desk at the boundary of this area, they serve as a visual and physical indicator of where the public area terminates. Next to the Speedlane Open turnstiles, which are notable because they do not have any closing barriers, guards watch as people pass through them to ensure that everyone is scanning their IDs and that the IDs are valid, in which case the turnstile shows a green light. Controlling access without being obtrusive In a situation where a red light shows and the turnstile alarms, the guard will check the person’s credentials and can try to troubleshoot the ID card. “The decision was really about what creates the least barrier to those entering and exiting the building,” said Dutil. “We don't really want our students to feel like they are overly policed or that our buildings are not accessible to them. So the design of the Open turnstiles provided the best solution in terms of controlling access without being obtrusive.” Before the Student Center was built, students entering any campus building would just show their ID to the security officer as they walked past. The administration realized that while this does provide some level of security, it is not foolproof – particularly when many people are entering at the same time for a class. Brief learning curve The College’s head of security made the suggestion to install a system that would allow for swift passage of authorized people while maintaining accountability around who enters and exits the building. As anticipated, there was a brief learning curve for the students using the new system As anticipated, there was a brief learning curve for the students using the new system. “This was the first system like this on our campus,” said Dutil. “And the first few days that the new Center was open were also the first few days of school. There were a lot of people new to the campus who required a bit of coaching from guards and our student staff in terms of where to place your card, and to not walk through before you place your card.” Dutil confirms that the access systems placed at Boon Edam turnstiles are actually outperforming those placed at swing doors across the campus for convenience and adoption. Benefits beyond campus security “Across the campus, there is a card reader at every swing door entrance of a building where you present your card and a light turns red or green. But oftentimes the card reader is missed, or depending on the placement of the lights and placement of the guard, it can be kind of hit or miss with students walking right by it.” “But with the Open turnstiles, they're very visible and although they're not a total barrier to entry, they are something that's right in front of you. Because it's very noticeable and not easily overlooked, the students have learned pretty quickly to get their ID out. In fact, this was meant to be a test run for the campus to ensure it would be viable and worthwhile for other buildings as well.” The turnstiles have delivered additional benefits beyond basic campus security, according to Dutil. Convenient touch panel “One of the nice things about a system like this is that we can count visitors to the Student Center because we get the data of everybody that scans in. So on a busy day for us it's about 2500 people throughout the day. That can range depending on what's going on and what time of year it is. On weekends we're very slow, since there are no classes – maybe 900 to 1200.” There's a really convenient touch panel right at the security desk called the BoonTouch" “We are a rental venue as well, so we have times where the building is open to non-Columbia College Chicago people for events or other functions. There's a really convenient touch panel right at the security desk called the BoonTouch, where the officer can turn off the turnstiles during those times and then attendees can move through freely without any alarms going off at all.” Keeping the building warm Finally, the TQM revolving door delivers one additional benefit to the Student Center, located in a city known for harsh weather. “Revolving doors are always preferred at a building like this that gets a lot of traffic going in and out. We have cold, drafty weather that blows right into our main space at that first floor entry. The revolving door helps to keep the building warm and saves energy and utility costs as well,” said Dutil. “Students feel safe and comfortable entering the building at night,” he concludes. “Our building has a lot of nooks and crannies, and someone can end up alone in a space. And so I think knowing that the only people that are in that building are the ones that are supposed to be there is helpful. Overall, our students appreciate the effort to try to keep them safer.”
Aeroturn LLC, a turnstile manufacturer that offers 100% Made In The USA turnstiles, announced that the company’s turnstiles were selected for deployment at multiple locations of a major Biopharma manufacturer in North America. Biopharmaceutical, also known as a biological medical product, or biologic, is any pharmaceutical drug product manufactured in, extracted from, or semi-synthesized from biological sources. Upgrading security Different from totally synthesized pharmaceuticals, they include vaccines, blood, blood components, allergenics, somatic cells, gene therapies, tissues, recombinant therapeutic protein, and living medicines used in cell therapy. With the current global health pandemic, the Biopharma manufacturer needed to upgrade the security at its central US location quickly and efficiently. Over the years, Aeroturn has been instrumental in helping this Biopharma giant secure multiple campuses where security needs to be at the highest level. With a heavy focus on research and development, the Biopharma company was looking for a turnstile solution that could operate without any downtime and secure its perimeter effectively. With major security upgrades over the years which warranted finding the best turnstile manufacturer in the industry; the decision was solely based on performance. 10 million passages guarantee After researching multiple vendors and receiving live product demonstrations, the physical security team knew that Aeroturn was the clear winner. “We are proud to have been selected as the winning turnstile solution after competing against two other large well-known turnstile manufacturers,” states Michael Stoll, VP of Technical Sales & Marketing at Aeroturn. “Aeroturn won the initial project back in 2018 and all future installations based on superior reputation, performance specifications, durability, endurance, our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” With a phased approach, Aeroturn won Phase I in September of 2018 and deployed four lanes of its enhanced X-Wing turnstiles with custom LED’s that matched the corporate colors at the Biopharma company’s North American headquarters. Phase II consisted of an additional 11 lanes of X-Wing turnstiles that were deployed the following year at another North American campus. Customized turnstile solution After proving themselves over the course of two years, Aeroturn was selected once again in 2020 to complete Phase III with an additional 8 lanes of turnstiles and the remaining to be deployed at the end of 2020 at the same campus. Each location came with its own set of customized floor conditions, side entry cabling, and low-profile platforms when necessary; making this a customized turnstile solution. In addition, all work was performed off-hours and weekends to help minimize disruption at the facility at no additional cost to the Biopharma company. Due to the current national emergency, the Biopharma company needed to be proactive when it came to securing its entrance ways and knew it could rely on Aeroturn to deliver high performance turnstiles each and every time.
A high school campus in an Atlanta suburb underwent a complete remodel. Temporary modular buildings were set up on a large area of the campus to act as classrooms during the year-plus long construction. Due to the temporary structures, accessible HVAC units and threat of vandalism, a stable and reliable solution was needed that would also be easy to both install and move if necessary. Wireless passive infrared detectors An integrator was selected who then teamed up with Optex to create a reliable, effective security solution that included iSeries battery-powered, wireless passive infrared detectors. This allowed for a simple, inexpensive yet effective way to protect the assets inside the structures, as well as the HVAC units on the exterior. The detectors protecting the perimeters of the site were set up to trigger strobe lights that alert an on-site guard to the location of any breach, while the system as a whole is monitored by the district's security team. Because the integrator chose to install a battery-powered, wireless option, any of the units can also be relocated if needed, based on changing site conditions or future security needs. Crime prevention at perimeter The temporary campus now maintains a secure perimeter and campus that detects intruders and prevents theft and vandalism. With the battery-powered system in place, the end user has multiple levels of protection and can respond quickly to alarms before any damage is done. Benefits and features of the iSeries battery-powered, wireless outdoor PIR detectors from OPTEX include: No trenching or wiring required allows for a quicker and less expensive install. End user will experience less downtime to business operations. iSeries version includes Inovonics EN1941 transmitter and batteries pre-installed, allowing for a quicker set-up time on job site. Dual PIR feature greatly increase stability outdoor and drastically reduces any false or missed alarms. Units can be easily relocated based on changing site conditions. Outdoor multiple detection pattern Optex’s outdoor PIR detectors (excluding the LX series) utilize the Multiple Detection Pattern technology, where two double-layered detection patterns (upper and lower) have to be activated to generate an alarm condition. This reduces false alarms, particularly those caused by temperature changes, light reflection and small animals. The size judging function virtually eliminates false alarms due to small animals and other moving objects such as vehicles. By utilizing originally developed pyro-elements, it creates a configuration area consisting of 94 high density detection zones. Also, the detection pattern technology requires both detection areas have to be activated in order to generate an alarm condition making it more tolerant to false alarms caused by small animals or pets.
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no longer an option. Instead, a single, all-encompassing security platform should deliver connectivity, convenience and simplicity, keeping one’s premises secure and filtering access to manage the ever-changing movement of people. This is where Incedo Business comes in: a new solution for all types of premises, handling security while leaving one free to focus on growing the business. Incedo ensures employees, customers and goods are where they need to be. Incedo makes life and tasks easier and more efficient for everyone, from installers to end users. Facility managers enjoy more control and flexibility than they ever thought possible, maximizing return on investment, with Incedo Business able to scale quickly when needed. System administrators can do more within available budgets: initiating, cancelling or amending access profiles, and monitoring movement around their site in real time. Building users, meanwhile, get the individual access times and entry permissions they need. They can move freely without compromising the security of other people and equipment. Integrators can upgrade connected technologies and systems quickly, minimizing risk and meeting customers’ raised expectations of modern technology. Installers no longer need to wrestle with incompatible systems: easy interoperability is built into Incedo, meaning no more delays or unnecessary complexity. With Incedo’s modular platform approach, one simply chooses the security hardware and credentials one needs and the appropriate management system option. One can set exactly who can access which doors, and when, from the user-friendly Incedo Business software interface. When Incedo Business launches, one can pick the most suitable options from a growing range of Incedo-enabled security and access control hardware. Road-tested, award-winning ASSA ABLOY wireless digital locks and wired ASSA ABLOY wall readers secure all interior and exterior doors. Also already available, a choice of card and token credentials helps users enjoy safe and convenient access to, and movement around, the premises. Incedo mobile keys add the flexibility to open doors with a smartphone. Incedo’s system management options, Lite, Plus and Cloud, scale from entry level up to cloud-based administration. One can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand, or switch system management options, all within a single environment. Migration between Lite, Plus and Cloud options is always seamless in any direction, ensuring total flexibility for the business. Incedo moves with you, today and in the future However your business moves, an Incedo system moves along. Having a flexible platform, able to adapt as the organization changes, reduces total cost of ownership: one never needs to retrain staff or start over from scratch. New Incedo-enabled hardware from ASSA ABLOY and third-party providers will continue to be connected to, and made available within, the evolving Incedo platform. One picks the hardware and software configuration one wants, and can change one’s mind as often as one likes. Incedo guarantees flexibility and scalability in every way, to meet the security needs today and in the future. And because the security and operational challenges at a university, small hotel or hospital are not the same as those faced by a public building or corporate HQ, the Incedo ecosystem will introduce new, advanced user interfaces for the specific industry. “Incedo Business transforms the experience of using and managing a building. It is also the seed from which our revolutionary Incedo ecosystem will grow in the months and years ahead,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “A future where doors are smarter, connectivity and movement are seamless, and access management is genuinely intelligent. This is our vision for Incedo and for those who will be using it.” Incedo™ Business embodies ASSA ABLOY’s vision to create a safer and more open world, keeping everyone on the move. Together. To learn more and download a free solution guide, visit https://campaigns.assaabloyopeningsolutions.eu/Incedo-business
The Office for Students (OfS) is the independent regulator of higher education in England, responsible for ensuring that all undergraduate and postgraduate students, whatever their backgrounds, have a fulfilling experience of higher education which enriches their lives and careers and delivers value for money. They are headquartered in Bristol, United Kingdom with a workforce of around 450 people. GDPR Data Privacy Management Higher Education Funding Council for England (HEFCE), Office for Students’ predecessor, became a client of SureCloud back in 2017, implementing the GDPR Data Privacy Management Suite to support and enhance their GDPR program. As a new organization and a successor of HEFCE, Office for Students has been looking to mature its approach to risk management. The focus of this for the team was initially to improve risk policies and procedures, to develop internal capability, enhance reporting to show transparency and allow challenge, and to identify and manage risks enterprise-wide systematically. Effective Risk Management approach Office for Students needed a single, seamless, enterprise-wide solution to manage all aspects of risk management These improvements established a highly effective risk management approach, but the organization soon hit the ceiling in terms of their process supporting risk systems, with technology being a limiting factor rather than an enabler. The organization was relying on numerous disparate spreadsheets to assess and monitor different types of risk, these were inconsistent, time-consuming and error-prone. Office for Students needed a single, seamless, enterprise-wide solution to manage and monitor all aspects of risk management. Data privacy Risk Management solution Office for Students has been a SureCloud client for cybersecurity services since March 2017 and began deploying SureCloud’s governance, risk and compliance (GRC) solution in July 2017 to assist with their responsibilities under GDPR. Knowing that SureCloud also offered a comprehensive risk management solution (recognized on Gartner’s IRM Magic Quadrant), which could be tailored to their precise needs, Office for Students opened a conversation with SureCloud about how best to configure their existing SureCloud Data Privacy Risk Management solution to enable enterprise risk management. SureCloud’s Risk Management solution delivers: A central view of risk across the organization via a single intuitive dashboard Risks organized across divisions, legal entities, business functions, and geographies The ability to provide a central repository for enterprise risk, allow the organization to show the entirety of the risk environment and consider overlaps and interdependences A range of risk management methodologies to understand the likelihood, impact and overall risk rating Configurable drillable dashboards and reports to provide a real-time snapshot of risk at any time Centralized, cloud-based platform SureCloud’s centralized, cloud-based platform underpins the Risk Management product SureCloud’s centralized, cloud-based platform underpins the Risk Management product, allowing anyone from across an organization deploying the application to add information at any time, from anywhere. Office for Students worked with SureCloud to configure the Risk Management application to their precise needs and was ready for rollout ahead of schedule. Rapid implementation services “SureCloud got to grips with our requirements incredibly quickly,” said Ben Whitestone, Head of Governance at the Office for Students, adding “As the only independent regulator for higher education in England, we regulate in the interests of hundreds of thousands of students, and we take that responsibility very seriously.” Ben adds, “Managing the risks we face is an important part of our governance. But with our legacy systems, we were focused more on updating spreadsheets than actually managing risk. SureCloud’s platform is enabling us to take a far more agile approach to risk management, focusing on taking action to mitigate threats and exploit opportunities, with substantial time and cost savings as a result.” Streamlined, centralized Risk Management “SureCloud’s Platform has moved us away from using a series of disparate spreadsheets and countless emails for recording risk, with all of the potentials for errors that entails, to a single, centralized source of risk information for every member of staff,” said Whitestone. He further adds, “It’s dynamic and agile, if we want to get a snapshot of risk for a particular department or function, we can.” Intuitive, user-friendly platform We are very pleased with how quickly staff can get to grips with the SureCloud Platform" “Despite us being at the start of our risk management journey, we are very pleased with how quickly staff can get to grips with the SureCloud Platform, this was a key factor for us” commented Whitestone. Whitestone adds, “They can more or less log on and go – it’s extremely intuitive and easy-to-use. In turn, this means that it frees up a huge amount of time spent manually inputting or transferring information, which is a great advantage for us.” Systems and culture working in-sync “We undertook a great deal of work to evolve our culture of risk management, to one that was far more consistent and proactive.” stated Whitestone He adds, “With SureCloud’s Risk Management solution in place, we have the systems to underpin that culture, and enable us to take a far more streamlined, agile and accurate approach to help manage risk across the organization.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload