Campus security systems
ReconaSense, a provider of innovative physical security intelligence and next-gen access control, announced the debut of its ReconMobile command-and-control center that lets users lock down facilities, tap into video surveillance systems, and/or report and respond to an emergency from a mobile device. Managing a large campus or facility means being in charge of a myriad of systems, dynamic populations, and countless points of entry. Lack of reliable data about any of those can lead to expensive...
Hikvision’s Miami office co-sponsored an event in partnership with nonprofit Mission 500 and other security industry pioneers to support local students who attend the Title 1 Crosspointe Elementary School in Boynton Beach, Florida. Participants built and donated 700 backpacks filled with school supplies and other essential items. On Friday, Aug. 9, Hikvision Miami logistics and facility manager, Anthony Martinez, and Florida & Puerto Rico sales director, Shane Nikov, convened at Cross...
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situatio...
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
DMP names Edward Zachar to the position of dealer development manager in the company’s Los Angeles region. He will be responsible for developing new sales and providing on-going service to the area’s DMP-authorized dealers, helping them grow their businesses. Zachar has had many successful years managing sales teams. Most recently, he worked the last 10 years with Johnson Controls Security Solutions as regional government account manager. He also served Johnson Controls as sales man...
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-2004G-SFP and LMX-2004G-SFP series. Antaira Technologies’ LMP-2004G-SFP and LMX-2004G-SFP series are industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applica...
It seems like every day there is another school or public shooting incident in the US. It dominates the news and has become a point of stress and fear for many Americans. According to the US Department of Justice Federal Bureau of Investigation, in 2018 alone, there were 27 incidents across 16 states resulting in 213 casualties. There is a great deal the security industry can do to prevent such violent incidents and preserve life. Protection Layers In general, protection should be built in layers focusing on the outer perimeter, the building perimeter (entry points) and interior spaces. Electronic access control can provide preventive measures to reduce access in these layers Electronic access control can provide preventive measures to reduce access in these layers. In fact, the National Training School’s Electronic Access Control 14-hour online course has been recently updated with active shooter preparedness in mind. Building security In commercial buildings, this entails having different levels of access throughout the building to prevent individuals from going where they shouldn’t. All visitors should be directed to a single monitored entry point, preferably an area that restricts access to the rest of the building. Security access can be restricted to certain times of day to prevent employee access to the building when they should not be there. Temporary badging should provide limited and timed access that automatically disables when no longer needed. Implementing electronic access control When implementing electronic access control or any security system, installers need to work with the owner and authorities to develop policies and procedures for building lockdowns and evacuations. They can then work to create secure paths of exit. Even in public access buildings, many of the same requirements could be applied and buildings could use alarms to engage added security in the event of a shooter. Life safety systems When designing systems, installers will need to work with the local Authority Having Jurisdiction (AHJ) to ensure that they do not create additional life safety concerns, especially as it relates to fire. Imagine having the ability to limit a shooter’s access to other parts of a building and restrict how they move When creating secure exit paths, installers will likely need to provide egress access to all doors to allow emergency exit. Also, most AHJs will require a Knox Box, or something similar, to provide keyed access for emergency responders. When designing access control systems to be secure, always remember code states, ‘No Special Knowledge Required.’ - NFPA 101, 184.108.40.206.3 [‘18] -IBC 1010.1.9 [‘18] Limiting shooter access Imagine having the ability to limit a shooter’s access to other parts of a building and restrict how they move. This could give individuals what could be lifesaving extra moments. As an industry, we should keep these ideas in mind as we tackle security scenarios for job proposals and design. ESA’s National Training School has updated its online Electronic Access Control course — a 14-hour course, followed by a two-hour examination, providing broad training and information to successfully design and install electronic access control systems.
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-1802G-SFP and LMX-1802G-SFP Series. Antaira’s LMP-1802G-SFP and LMX-1802G-SFP series are industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applications in harsh and outdoor environments, such as manufacturing automation, security surveillance, power/utility, waste water treatment plants, oil/gas/mining, and transportation. Industrial switches These devices support high density Ethernet port connectivity, wide bandwidth, long distance data transmission, and have a superb reliability factor. The LMX-1802G-SFP Series is an ideal choice for campus ring solutions with its two fiber optic ports supporting an open standard ring technology (ERPS). These outdoor devices are able to communicate and send critical information back to an enterprise switch There are many proprietary ring technologies available but using an open standard like ERPS means that it is possible to have equipment from different manufacturers working together in the ring. For example, campuses have networking rings consisting of hardened and industrial switches for outdoor environments that require a wide temperature-rated device. These outdoor devices are able to communicate and send critical information back to an enterprise switch at a data center. Electromagnetic interference Antaira’s LMP-1802G-SFP Series can not only provide a large number of PoE ports (30 Watts) for high density security applications, but also fiber optic interfaces for long range connectivity (1 meter to 100 KM) that is 3 feet to over 60 miles. The SFP port will not only allow connectivity beyond the 100 meter/300-foot limitation of copper cable but also permits connectivity through areas where electromagnetic interference may cause issues such as on a factory floor. The Antaira management software on these switches helps monitor, react, and troubleshoot applications to reduce the cost of maintenance and downtime. Features such as SNMP Traps, Syslog, and port mirroring can be priceless when maintaining a system and reducing issues causing outages.
Through August 2019, IDIS, the South Korean video surveillance solutions manufacturer will highlight the applicability of its end-to-end Total Solution to the spectrum of challenges facing campus safety and security professionals in the Americas. Campus Safety Conference IDIS America, the regional headquarters for South Korea’s in-country manufacturer of surveillance technology, kicks off several weeks of focus on the unique challenges and concerns related to campus security in the Americas. Beginning with an appearance at the 2019 Campus Safety conference in Dallas and continuing through August with outreach focusing on the unique suitability of the high-performing, cost-effective IDIS Total Solution to meet the widely varying (and, at times, highly specific) needs of campuses, large and small, in the Americas. “There’s no question there has never been a greater time of challenge or urgency when it comes to campus safety and the protection of our nation’s students, faculty, staff and others,” notes Keith Drummond, Senior Director at IDIS America. “You only have to open a newspaper—or even just talk with the students in your life—to know that challenges to campus safety and security run the gamut from traditionally smaller, more familiar concerns like fights, contraband, and unauthorized movement, to worries about lethal threats like active shooters.“ IDIS Total Solution IDIS promise to meet any surveillance need, of any size or complexity with high performing technology" Keith further states, “When you throw in the inherent complication of maintaining full situational awareness in a dynamic campus and the requirements most schools have to build and maintain security infrastructure—often funded with limited taxpayer, grants, or donor dollars—in the most fiscally responsible way possible, campus safety and security professionals must balance a great deal as part of keeping their charge—and no two campuses are ever alike. That’s where we believe IDIS and it’s adaptable, scalable, and complete end-to-end total solution for both analog and IP surveillance makes the difference.” Drummond also points to the IDIS promise to “meet any surveillance need, of any size or complexity” with high performing technology and a low total cost of ownership as key to the company’s unique value proposition for American campuses. The company’s flagship DirectIP range of IP solutions, award-winning for its true plug and play ease of installation and use, next-generation features, high degree of interoperability, forward- and backward-compatibility guarantees, and long (often longest) industry warranties—all with a cost-free, full featured VMS included and total lack of recurring licensing fees. DirectCX analog solution This serves as the base of the company’s solution for campuses, with complementary product lines (including the full product line in the company’s DirectCX analog solution, easily integrated with existing systems or seamlessly incorporated as part of a mixed analog/IP requirement) and sub-ranges (including the IDIS Compact Solution of IP cameras designed to deliver high performance in with lower-profile form factors and a wider variety of price points). “IDIS’s technology makes it possible for those responsible for the design and deployment of campus security solutions to avoid traditional (and frustrating) tradeoffs between quality and performance and cost-effectiveness,” adds Andrew Myung, President of IDIS America. IDIS Compact Solution Our technology is designed and developed through our market-responsive R&D process" “Our technology is designed and developed through our market-responsive R&D process, manufactured in our secure, flexible, and efficient Smart Factory (cited in peer reviewed research and honored with a Presidential Citation for innovation), and delivered with our industry leading warranties and compatibility guarantees. This allows us to deliver next generation technology, packed with innovative, award-winning features, benefits, and support with a proven low total cost of ownership, without recurring licensing fees.” “That unique mix of factors and advantages is huge for campuses that are both performance- AND cost-conscious, and for whom showing maximum attentiveness to the core mission of keeping students and campus communities safe, as well as strong financial stewardship of taxpayer, grant, and donor dollars is essential.” IDIS cameras Drummond and Myung note, that ultimately, it’s the ability of IDIS cameras, recorders, software to truly meet any surveillance need, no matter the size or complexity of the requirement, that makes the case. That’s why the company’s activities over the next several weeks will include interviews, topical and industry education social media posts and videos, and demonstrations and appearances, beginning with an appearance at the 2019 Campus Safety conference in Dallas, where visitors can discuss specific challenges and requirements with the IDIS team and go hands on with IDIS technology. The IDIS team will also be available for phone, the web, and in person (including demonstrations at the IDIS America demonstration center, near Dallas) consultations regarding general and specific campus safety challenges.
Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorized side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available in the Fastlane Glassgate 155 is the first of its kind to identify and alert when sidegating is occurring” Sidegating is a growing security issue as changing regulations and customer demands for increased pedestrian and wheelchair user comfort dictate the need for wider turnstiles. If a lane is wide enough to comfortably fit a wheelchair, it is also wide enough to fit two pedestrians side-by-side. Until now, turnstiles have been unable to detect this kind of behavior, which leads to increased risk for unauthorized access and security breaches. Fastlane Glassgate 155 turnstiles Intelligent infrared matrix powered by neural network algorithms senses who or what is going through Smarter Security’s Fastlane Glassgate 155 turnstiles feature new optical technology to prevent sidegating from happening. An intelligent infrared matrix powered by neural network algorithms senses who or what is going through the turnstile in real time and makes thousands of calculations per second to determine if entry should be authorized. The system can distinguish between people and objects to minimize nuisance alarms, and process unsurpassed throughputs of up to one person per second. “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available in the Fastlane Glassgate 155 is the first of its kind to identify and alert when sidegating is occurring,” said Jeff Brown, CEO of Smarter Security. “Our customers who need those wider lanes also need to have the confidence that only authorized people are coming into the building. This breakthrough reinforces how far ahead Fastlane technology is, and why it has been number one for much of the past decade.” Intelligent optical turnstiles, speed gates Smarter Security’s Fastlane brand of intelligent optical turnstiles and speed gates are favored by end users for their superior return on investment, and by architects for combining depth of functionality with extensive customization options. The turnstiles are installed in thousands of iconic building lobbies, government buildings, corporate campuses and universities around the world.
Workplaces, schools, hotels, sporting events, entertainment venues and other large –and sometimes not so large – facilities have become headlines in the news for all the wrong reasons: violent attacks. The Safer Solution is an effective training method that addresses public/workplace violence and active shooter incidents – by both alleviating a situation before it ever occurs, and by preparing civilians with appropriate response skills in the case of a crisis developing. The Safer Solution The Safer Solution was developed by Ken Good, Ted Westmoreland, and Michael Clarke The Safer Solution was developed by Ken Good, a Navy SEAL; Ted Westmoreland, an Army Special Forces Medic; and Michael Clarke, an Executive Protection Specialist – who, with their combined training, experiences and unique skillsets, have created a new method to teach individuals and organizations how to sense and assess an environment in order to act on red flags before it’s too late. In the event a crisis does occur, the training gives individuals proper skills to have a greater chance of survival as well as the ability to assist others. The Safer Solution provides training so that employees can: Increase situational awareness to allay an incident Identify and communicate threat concerns Protect themselves and others during an active-shooter situation Mitigate imminent and immediate attacks Perform lifesaving first responder actions Prevail overactive shooting situations through well-coordinated evacuation, barricade and engagement drills Training For Crisis Situations “It’s tragic and unfortunate, but the facts are that random acts of violence and active shooter incidents are increasing; ignoring these facts is no longer an option” said Michael Clarke, CEO of Archangel and one of the three partners in The Safer Solution. “We don’t believe that just telling people to ‘run, hide, and fight’ is effective training; individuals and organizations need a plan. The Safer Solution empowers people so they can prevent, protect, and prevail against aggressive attacks. Our training provides them with the tools and skills needed to make their work environments and public places safer.” The Safer Solution goes beyond the traditional ‘run, hide, fight’ direction" “The Safer Solution is our strategic partner in helping us design, implement, and maintain our workplace violence and active shooter program. With their guidance we have formulated strong company policy, in-depth training and coaching, and our threat response plan. The Safer Solution goes beyond the traditional ‘run, hide, fight’ direction. Their comprehensive in-person and online training has aided Randstad in developing and maintaining a comprehensive safety and security program to deal with the real threat of workplace violence.” - Corey Berghoefer, Senior Vice President – Risk Management & Insurance, Randstad US. Online Active Shooter Training Course “After having completed the online active shooter training from The Safer Solution, I am confident that this is the training our organization needs to help our staff prepare itself in case an active shooter situation was to arise. The training was interactive, kept me engaged and more importantly increased my knowledge of what to do if I were to ever find myself in that unfortunate circumstance. One of the key elements of the training is what to do after, the information is key, and may save a life.” - Rudy Amador, Director Safety, Dole Fresh Vegetables, Inc. The Safer Solution is offered through on-site presentations where the team will come to a location and provide “hands on” instruction, demonstrations and drills. An effective, online e-learning version of the training, complete with videos and self-assessment drills, is also recommended for larger organizations with multiple locations.
Connected Technologies LLC, maker of the award-winning Connect ONE cloud-hosted security management platform, has added Mobile Badge to its wide range of value-add features and capabilities included in the turnkey system interface. Designed for schools, campuses, construction sites, clubhouses or other locations with a changing, fluid population, Mobile Badge puts credentialing identification management on the user’s phone, similar to a traditional physical badge. Mobile Badge can be used to instantly verify active/inactive status via barcode and can also be used to print a temporary visitor’s badge if necessary. System Management Time The user’s Mobile Badge consists of the dealer or end-user’s company logo, name, picture, custom information fields (such as student/employee identification number) and a barcode for verification scanning, with an easily recognizable green border indicating an active credential and red border indicating inactive status. Scanning the barcode will instantly show the user's status, permissions and last activity. In the case of a visitor badge, one scan of the barcode and the user’s credentials can be quickly removed after use, saving system management time. Mobile Badge in the Connect One app is used in place of a physical badge and is conveniently accessed from the login screen (if not currently logged in), account window and ScanPass Mobile Credential screen. Headquartered in Monument, Colo., Connect ONE is a patented management solution for systems integrations that dealers resell to their customers, growing their monthly recurring revenue.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organizations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting Educational Facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organizations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organization, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active Shooter Incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralize video management, viewing and analysis. Upgrading From Analog Systems Altogether, its security system consisted of older analog platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralize system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimized for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximizes performance and storage capacity utilization. The platform also hosts the university’s video management solution, which serves as a centralized source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting Air Travel And Airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernize and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage System Updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing Expenses And Costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialized IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organizations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.
Gunshot detectors use digital microphones installed on (or in) buildings or along streets that listen for evidence of gunshots, provide near instantaneous notification, triangulate the location of shooters and direction of a shot, detect the type of gun and ultimately aid in catching fleeing suspects and solving crimes. Gunshot detection is just one technology playing a role in the larger trend by city agencies to improve core city services. Cities are turning to what are referred to as ‘smart city’ solutions – new, innovative technologies that improve and maintain a high quality of life and ‘liveability’ for citizens. Several cities in the United States have implemented gunshot detection systems. Identifying and deterring gun violence Gunshot detection systems can shorten the response time in an active shooter situationShotSpotter, a provider of gunshot detection solutions that help law enforcement officials and security personnel identify, locate and deter gun violence, announced that seven new cities have deployed ShotSpotter technology in their communities. The new cities include Cincinnati, OH; Jacksonville, FL; Louisville, KY; Newburgh, NY; Pittsfield, MA; Syracuse, NY and St. Louis County, MO – joining the more than 90 jurisdictions that rely on ShotSpotter to ensure a fast, accurate response to gunfire incidents. Three existing ShotSpotter cities, New York City, Chicago and Birmingham have also recently expanded their coverage areas. Data capture form to appear here! Gunshot detection systems can shorten the response time in an active shooter situation. Early detection should be a primary aim, second only to prevention. Security professionals must be part of both of these areas, working in partnership with relevant administrators, local government, law enforcement, first responders and the community to help prevent and better respond to gun violence. Gunshot localization solution In addition, active shooter events – large or small – are almost always sudden and unexpected, which places a burden on security personnel to manage these risks without creating a prison-like environment. A gunshot localization solution can turn a video camera system into a real-time safety system in the event of an active shooter A gunshot localization solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. ShotPoint is a network of sensors which can be mounted on walls, ceilings, streetlight poles or other indoor or outdoor locations. Using a ‘sensor mesh approach’, ShotPoint reliably detects and localizes the source of gunfire; ranging from small handguns to high caliber rifles. The system can cover large indoor or outdoor areas such as schools, office buildings, retail centers, campuses, and parks. Accurately provides gunshot location Each sensor has an array of four acoustic channels (microphones) that can locate the source of a gunshot sound, the time of arrival and the time distance of arrival. ‘Hearing’ shots from several vantage points (using multiple sensors) enables the system to take into account the angle and time of the sound, which vary in different environments, thus accurately providing the location of the gunshot. A ‘fusion processor’ box (at the edge) listens to the various sensor nodes and computes the location of the gunshot, relative to a floorplan and/or based on global positioning system (GPS) location. In an outdoor location, additional information may also be inferred, such as the trajectory of the gunshot and/or the caliber of the firearm.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant color and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. Ensuring safe, family friendly environment Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering pointThe presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Surveillance system for crime prevention Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. A technical solution with proven power, performance, and reliability was paramount to ensure protection of property While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. Protection of property and campus safety The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the Center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology, provided a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces; and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. Using Direct IP NVRs and cameras SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution SuiteThe City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set], at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite, and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. SARC’s virtual guard protection The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighborhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). The integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote ‘voice down’ virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. Keeping people and property safe The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
Around 30 IP video entry systems from Castel have been installed on the stunning new £330 million University of Northampton campus. The Waterside campus, developed on the site of a former power station bordering the town center and River Nene, is designed for 21st century teaching and a low environmental impact. It has a full range of integrated learning environments and a 24/7 library and learning zone. The campus, which opened in autumn 2018 and can accommodate 14,000 students, has been developed in the Waterside area of the town and includes a learning hub, creative hub, sports center, senate building, hotel and student accommodation village. Integrated with Salto access control system The entry stations have been integrated with the site’s Salto access control system Castel video entry stations, installed by Protec Fire & Security Group, have been fitted at the entrances to the senate building, the learning hub, car parks and service yards, while master stations have been fitted in the main security room, backup security room, at the senate reception desk and at the learning hub reception. The entry stations have been integrated with the site’s Salto access control system so that authorized cardholders can gain access using a key fob, while visitors seek entry via the video intercom. All entry points are single button and a Castel server is installed to handle unanswered calls via call routing and forwarding to other Castel IP handsets. Vandal-Proof entry panels The Xellip IP solution delivers IP audio-video access across a PoE cabling network. Features such as a built-in induction loop, audio/call progress feedback and colored LED pictograms help the university to comply with disability discrimination legislation. The entry panels are vandal-proof and the master stations feature a color video touchscreen Features of the system include call waiting and priority calls, echo and noise cancellation, audio conferencing, group calls, privacy settings, call overflow, call forwarding and voice messaging. The entry panels are vandal-proof and the master stations feature a color video touchscreen. Efficiently manage building access “The Castel video entry system complements the 21st century approach to university life reflected in our stunning new campus,” said Becky Bradshaw, Head of Campus Services at the University of Northampton. “We are very pleased with the way the system helps us manage access and security to our buildings in an efficient and relatively effortless way.” Simon Key, Project Manager at Protec Fire & Security Group, said: “The installation of the Castel system was trouble-free as everything was installed on an IP network, with PoE obviating the need for additional power supply cabling. We are delighted to have worked on this cutting-edge project, showcasing the role of state-of-the-art security systems on a brand new and impressive campus.”
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for residents. The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” In order to minimize the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Gallagher Command Center, together with the Aperio wireless locking technology, was selected as the University’s choice Aperio wireless locking technology A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Center, together with the Aperio wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Gallagher Command Center integration The Gallagher Command Center integration allows for the access key and student ID to be combined into one card, offering a number of benefits to both students and staff. Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Secure, authorized access control The simple act of swiping an access card automatically checks the student in and an attendance report can be instantly generated The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Center together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. Student security and tracking The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Center can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Combined access and student ID card “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.”
King’s College London, based in the center of London in UK, is a world-leading university and a founding college of the renowned University of London. One of the oldest universities in England, it was established by King George IV and the Duke of Wellington in 1829, receiving its Royal Charter in the same year. Campus security, access control King’s College London had been using a variety of access control products to control and manage security across its multiple campuses. Its key requirement was a standardized access control system that could operate college-wide and be scaled to include new buildings and establishments. Also, considering the college campus is based in the heart of London, the threat of terrorism and active shooter incidents is a major concern for KCL, especially in more recent times where attacks have taken place extremely close to college buildings and campus. With thousands of students and employees to protect, the need to adopt the latest security features is essential in order for the college to keep all areas secure, in particular student accommodation, high security labs and research facilities. Gallagher access control solution Gallagher’s access control products were easily integrated with King’s College’s existing systems With Gallagher technology already successfully deployed in isolation at the university’s Guy’s and Strand campuses, it made sense to select Gallagher as the access control platform of choice for the entire college. Gallagher’s access control products were easily integrated with King’s College’s existing systems, including staff and student databases, and sources for cardholder information. This included the college’s enterprise Identity Management system, called FIM, which provides daily updates on joiners, movers and leavers to allow accurate decision-making by the security team. Additionally, Gallagher products were integrated to work alongside SITS, the college’s student management system, providing rapid updates of new students so that individual ID cards can be issued once the registration process is complete. Gallagher Mobile Connect app KCL has also invested in new mobile technology, with Gallagher readers that can be accessed via a mobile phone using the Gallagher Mobile Connect app. This will allow students and staff to conveniently access designated areas, control lighting, visitor access, and more. While it is still early days for the college using this technology, the system is adaptable and provides the ability to add features that meet future requirements. The overall benefits of the Gallagher security solution deployed at King’s have proved significant. Nick O’Donnell, Director of Estates and Facilities at King’s College London, says the Gallagher solution “improves service to King’s College’s facility users, especially its students, and reduces the college’s reputational risk by removing technical barriers to comprehensive security management.” Streamlining multiple security systems Streamlining the differing security systems used by individual campuses by introducing a college-wide standardized system has highlighted many additional advantages, including a considerable reduction in costs for training, special projects and operator skills. Gallagher integrations allow extra security features to connect to Gallagher Command Center Gallagher integrations allow extra security features to connect to Gallagher Command Center, creating a central administration system that keeps things simple to manage. Integrating with Aperio, for example, ensures doors are locked when people leave the room – providing peace of mind that rooms won’t be accidentally left open over night or during the weekend. Student and staff ID management Gallagher’s proven technology has boosted King’s College’s confidence in its electronic system. When there are alerts, the university’s security services can consult a single system and react quickly. Card holders are also now registered on one system, allowing tighter management of passes. Overall, the college reports fewer system failures, with better decision-making between its numerous estates and libraries, while multi-site students, staff and visitors have experienced easier card management.
Queensland University of Technology (QUT) is a major Australian university at the forefront of innovation and development in tertiary education. With a strong focus on research, technology, and sustainability, QUT has state-of-the-art facilities and equipment located across three campuses in Brisbane, as well as multiple remote research sites. With highly-valuable assets and facilities, open campuses, and a combined population of approximately 58,000 staff and students, it is imperative for QUT to have a robust yet discreet security and site management system operating 24/7. In 1995, QUT selected Gallagher as their technology partner to develop and implement a seamless security and site management solution. More than 20 years on, this partnership remains strong as QUT continues to seek new and innovative technology to manage their campuses and simplify operations. Intelligent access control readers QUT’s three campuses have diverse physical environments which are essentially open to the general public. One campus is situated between the Brisbane River and Brisbane Botanical Gardens, another is located in the center of an urban retail village, residential area and high-school. “The QUT campuses, while tertiary education institutions, are open to the public. This open and accessible environment presents a challenge when trying to protect the people and property of QUT” says Tracey Bartlett, Security Systems Officer. We have high expectation of the Gallagher system to manage the security of the non-public domain" “We have high expectation of the Gallagher system to manage the security of the non-public domain whileallowing staff, students and authorized visitors the access they require.” To do this, QUT operates 1500 intelligent access control readers across their sites. Integration with Command Center With the readers communicating directly with Gallagher’s site management software platform, Command Center, QUT is able to manage, monitor, and report on facility access. “We have buildings that are open until 10pm and others that are accessible 24 hours a day, 7 days a week.” says Bartlett. “Our security staff in the CMS (Central Monitoring Stations) are able to create building and cardholder schedules, quickly lock down areas, grant immediate access and generate report. These reports assist the QUT Space Management Team on exactly how and when our facilities are being used.” Key objectives Secure multiple campuses that have open perimeters Protect staff and students and assets Ensure quick identification and response to alarms from multiple systems Streamline cardholder administration processes Staff and Students Security The safety of students and staff is the number one priority for QUT and the university works hard to ensure they operate safe and secure campuses. Through Gallagher’s site management solution, QUT is able to integrate multiple systems – including emergency control points and alarms for temperature change, fire, and flooding - and feed the information into Command Center. Having one central monitoring platform ensures staff quickly identify, locate, and respond to any potential risks on campus. CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system" “Our CMS team operates 24/7, of CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system, have a complete view of what’s happening on site. They are then able to direct the field staff to areas of the campus that need attention,” says Bartlett. Ease-to-use software With tens of thousands of cardholders, all with ever-changing access needs, QUT requires a large number of staff to be able to administer and manager cardholder profiles within Command Centre. “The feedback from staff new to the CMS have commented that Command Centre is very easy to use software and they’re surprised at just what the system can do.” says Bartlett. In addition to streamlining the administration processes involved in cardholder management, Gallagher’s system also streamlines operations for QUT. More than just a card controlling physical access, QUT’s cards act as staff and student IDs, are used to operate printers and borrow from the library and can be used to monitor time and attendance. Through Command Centre, audit trails are generated for quick and easy reporting on each card function. Site Management software As a technology focused university, QUT continuously reviews and implements new systems and technology as they become available. In order to keep up with the very latest site management software available from Gallagher, QUT opts for an ongoing Software Maintenance agreement. “We’ll continue to welcome the opportunity to embrace Gallagher’s latest products as we are confident, they will meet our needs” says Bartlett.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?