Corporate Security
Evolv Technology has announced the appointments of a pair of executives with proven track records for guiding high-growth digital technology companies into global market leaders. Eric Pyenson joins as General Counsel from VMware Carbon Black (part of Carbon Black, Inc.) and A.J. De Rosa as Chief Revenue Officer (CRO) from Orbital Insight. Evolv just completed its most successful year since being founded in 2013. Scaling operations across all functions, the company is the world’s first and...
GAI-Tronics, the globally renowned company in manufacturing industrial and commercial communication solutions, has announced the release of its new access control feature to the HUBBCOM family of products, Temperature Sensing. Temperature sensing Temperature sensing is a new way to facilitate a contactless check-in process for employees and authorized visitors in a building. “GAI-TRONICS is proud to have developed an access control feature that complies with WHO COVID-19 safety standard...
Ensuring the safety of residents and staff in specialized housing environments has always been a priority for those in the sector. Karen Trigg of Allegion UK highlights the steps decision-makers must make to keep occupants in sheltered, extra care or supported housing safe and secure. Whether it’s adhering to fire safety or infection control guidelines, a topic that is never far from ones thoughts at the moment, there are many options that decision-makers can take to ensure maximum safety...
Synology Inc., globally renowned high-performance, reliable, versatile, and environmentally-friendly NAS servers and storage solutions firm, has announced the launch of the RackStation RS1221+ and RS1221RP+ (redundant power) 2U 8-bay rackmounted storage servers, which have been specially built to deliver high performance in a space-efficient and cost-effective manner. “The RackStation RS1221+ and RP+ storage server units are designed for small businesses, and indeed, ‘small’ t...
Ping Identity, the Intelligent Identity solution for the enterprise, has been honored with a Glassdoor Employees’ Choice Award, recognizing it as a Best Place to Work in 2021. The annual Employees’ Choice Award is based solely on the input of employees who provide anonymous feedback about their job, work environment and employer on Glassdoor, one of the worldwide leaders on insights about jobs and companies. Ping Identity was recognized as a Best Place to Work among Small and Medium...
HiveWatch, a security fusion startup company that uses multi sensor fusion to help companies respond better and effectively to physical security threats, has emerged from stealth and announced a seed funding round led by CrossCut Ventures, with participation from Freestyle and SaaS Ventures. Centralizing event data HiveWatch’s platform pulls data from a company’s disparate monitoring systems and security sensors to provide operators a single-pane-of-glass to evaluate and respond to...
News
AlgoSec, the network security management solution vendor, has introduced enhanced application visibility and auto-discovery features, and extended its integrations with SDN and SD-WAN solutions, in the new version of its core Network Security Management Suite. AlgoSec A32 version AlgoSec’s new A32 version gives IT and security experts the most comprehensive visibility and control over security across their entire hybrid environment. It enables organizations to align and manage their network security from a business perspective, giving them new automation capabilities for seamless, zero-touch security management across SDN, cloud and on-premise networks from a single platform. The key benefits that AlgoSec A32 delivers to IT, network and security experts include: Enable secure deployment of micro-segmentation in complex hybrid networks Built-in AutoDiscovery capability A32 automates identifying and mapping of the attributes, flows and rules that support business-critical applications across hybrid networks with the built-in AutoDiscovery capability. This accelerates organizations’ ability to make changes to their applications across the enterprise’s heterogeneous on-premise and cloud platforms, and to troubleshoot network or change management issues, thereby ensuring continuous security and compliance. Align and manage all network security processes from a single platform Risk detection and mitigation for cloud misconfigurations AlgoSec A32 version gives organizations instant visibility, risk detection, and mitigation for network or cloud misconfigurations, and simplifies security policies with central management and clean-up capabilities. This makes it easy to plan and implement micro-segmentation strategies to enhance security network-wide. Seamlessly integrate with SDN and SD-WAN solutions for enhanced visibility and compliance Seamless integration with SDN and SD-WAN solutions A32 seamlessly integrates with SDN and SD-WAN solutions, including Cisco ACI and Cisco Meraki A32 seamlessly integrates with SDN and SD-WAN solutions, including Cisco ACI, Cisco Meraki and VMWARE NSX-T to enhance visibility and ensure ongoing compliance with extended support for financial regulations such as SWIFT and HKMA. “The events of 2020 have highlighted how critical it is for network security experts to be able to make changes to their organizations’ core business applications quickly, but without impacting security or compliance across complex, hybrid networks,” said Eran Shiff, Vice President, Product, of AlgoSec. Maximising business agility and strengthening security Eran adds, “AlgoSec A32 gives IT and security teams the holistic visibility and granular control they need over their entire network to do this, enabling them to plan, check and automatically implement changes from a single console to maximize business agility and strengthen security and compliance.” AlgoSec A32 is the first version to run on the CentOS 7 operating system and is generally available currently in the market.
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security management system is an advanced solution in Carrier’s Healthy Buildings Program, and provides critical features like occupancy management, enhanced access control and proactive screening solutions to better protect people and assets, and optimize building health and efficiency. LenelS2, a globally renowned company in advanced security systems and services, is a part of Carrier Global Corporation, an international provider of healthy, safe and sustainable building and cold chain solutions. Transforming security data into actionable insights OnGuard version 8.0 provides end users with the tools to be in complete control of their security environment “OnGuard version 8.0 provides end users with the tools they need to be in complete control of their security environment and transform security data into actionable insights,” said Jeff Stanek, President of LenelS2. He adds, “As the world returns to the workplace, the breadth of new features, updates and enhancements in OnGuard version 8.0 make it an ideal solution for today’s unique security challenges.” Magic Monitor unified client The OnGuard security management system version 8.0 system enhances security and situational awareness through integration with the Magic Monitor client, a Windows and Mac OS client, which provides a unified view of access control, video surveillance feeds and web content in a single display. Users can view OnGuard system alarms, credentials as well as live or recorded video from the LenelS2 Network Video Recorder (LenelS2 NVR) platform, or third-party video management systems, including the Milestone XProtect system. The Magic Monitor unified client supports a single display, a command center workstation or expansive video walls. OnGuard Reports and Dashboard features To turn security data into actionable insights, the OnGuard version 8.0 platform now features a new OnGuard Reports browser client that provides customizable reports. An OnGuard Dashboard feature offers powerful visualization of system, cardholder and alarm data in a variety of graphical formats. The new interactive OnGuard Maps feature offers browser-based visualization of facility layouts and provides dynamic system feedback. With OnGuard version 8.0, the Maps feature is included within the OnGuard Monitor client and is accessible from any computer, tablet or smartphone. Usability enhancements and cyber security upgrades OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades The OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades to improve safety and convenience. Usability enhancements include easy-to-access language options in OnGuard Visitor Self Service mobile app version 1.5 and a richer video viewing experience across OnGuard web clients. The improved video experience includes new audio, digital zoom, snapshot capture and Milestone XProtect video support in OnGuard Monitor and Surveillance web clients. Enhanced security in K-12 education segment To enhance security in the K-12 education segment, integration with the Allegion Von Duprin Remote Undogging/Remote Monitoring (RU/RM) solution enables an electronic override of mechanical undogging for facility emergency lockdown and remote door status monitoring. ‘Secure by Default’ settings, coupled with license administration security improvements, further enhance cyber security across the OnGuard system.
Allot Communications Ltd. (Allot Ltd.), a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers and enterprises, has announced that a new mass-market cyber security solution, Allot DNS Secure, will join the Allot Secure family of cyber security solutions for communication service providers (CSPs). Allot DNS Secure The new Allot DNS Secure solution is supported by an agreement with Open-Xchange to license its OX PowerDNS technology, which will be integrated into Allot DNS Secure. DNS Secure is designed for CSPs who want to deploy a security solution primarily for fixed broadband subscribers. The solution provides protection against a broad range of cyber threats including malware and phishing and offers content filtering. It is deployed with a ‘light touch’ on the CSP network either as a standalone solution or together with other solutions in the unified Allot Secure family, such as HomeSecure, NetworkSecure and EndpointSecure. OX PowerDNS technology OX PowerDNS technology complements Allot’s comprehensive threat database and unique proxy capabilities OX PowerDNS technology complements Allot’s comprehensive threat database and unique proxy capabilities, such as carrier grade performance, multi-protocol enforcement and scalability up to many millions of subscribers. As a network-based cyber security solution, DNS Secure enables effortless user onboarding, eliminating the need for subscribers to download, install or update any software. Scalable end-user protection against malware “Building its new network-based cyber security solution on the OX PowerDNS platform will allow Allot to offer quick, comprehensive and scalable end-user protection against malware and phishing, combined with content filtering options, to its communication service provider customers,” said Neil Cook, PowerDNS Head of Product at Open-Xchange. “The agreement with Open-Xchange enhances the Allot cyber security portfolio with an additional high-quality product. It gives Allot the flexibility to address the needs of CSPs that want to provide additional cyber protection measures to their customers,” said Mark Shteiman, Vice President of Product Management at Allot Communications.
Finbarr Solutions, a foremost global security & risk management consultancy, announced the launch of free face-to-face video consultations with a member of the Register of Chartered Security Professionals. The service is available to any organization that would benefit from expert independent advice, regarding their security requirements and systems, manning levels, and/or security postures. Assess security provision The Register of Chartered Security Professionals was established under a Royal Charter issued to the Worshipful Company of Security Professionals in the UK and was launched in 2011. It is widely recognized as the gold standard of competence in the security industry. Ciaran Barry CSyP is the Managing Director of Finbarr Solutions and joined the Register in 2019. Ciaran comments, “January is often an ideal time to assess security provision for the year ahead, whether it is reviewing the performance and ongoing suitability of existing systems, preparing tenders for new services and solutions or assessing skills and training requirements.” Free consultation Many small organizations don't have easy or affordable access to expertise, thus Finbarr is launching free consultations The 30-minute free consultation can also be guided by a specific issue or topic such as handling sensitive workplace investigations, legal requirements for employees working from home, or dealing with cybercrime. Ciaran cites specific guidance that every organization can benefit from, in terms of preparedness and agility, to face the uncertainty of the year ahead, “Last year many business continuities and crisis management plans were conceived and initiated on the fly.” “It is important to frequently take stock of what is working, what needs to improve, and how to go about making the right decisions. Many smaller organizations struggle as they don’t have easy, or affordable access to expertise. It is for this reason Finbarr Solutions is launching free consultations.” CSyP education & experience In addition to the CSyP post-nominal, Ciaran has a Diploma in Security Management (with Distinction), a BA Hons Degree in Business Studies and holds an ASIS Certified Protection Professional qualification (CPP). During his career, Ciaran has also spent ten years serving in the British Army and eight years at Hertfordshire Constabulary as a detective.
ADI Global Distribution, the globally renowned wholesale distributor of security, AV and low-voltage products, announced that it has opened a new branch location in Fort Worth, Texas. This marks ADI's second location to serve the Dallas-Fort Worth (DFW) area and seventh location across the US state of Texas, and furthers strengthens its commitment to providing the best and most convenient service to dealers. The new ADI Fort Worth branch, located at 5036 Saunders Road, Fort Worth, Texas, will provide dealers with more access to ADI's full range of products and services. Exploring opportunities to expand As part of its strategic growth plan, ADI continuously conducts a market analysis of its current locations, customer locations, market demographics and travel times to ADI branches. With this data, ADI identifies new opportunities to expand its branch network and further enhance its customer service to dealers. The Dallas-Fort Worth (DFW) area represents one of the fastest growing metro areas in the U.S., and by opening a second location here ADI will be able to better serve dealers across the city and in surrounding areas. ADI Fort Worth location Expanding our distribution network is part of our overall growth strategy" “The ADI Fort Worth location is the second new branch that we've opened over the past few months in North America,” said Bob Appleby, Vice President and General Manager, ADI Global Distribution North America. Bob adds, “Expanding our distribution network is part of our overall growth strategy, and furthers our commitment to provide superior service, products and support. We're excited to open our doors to another ADI location in the Dallas-Fort-Worth area.” Secure lockers for Pick Up Anytime service The new Fort Worth branch occupies a 10,000-square foot space that is fully stocked with an assortment of products across all categories. Conveniently located in the southwest DFW area with easy access from all the major highways, the new branch will help reduce customer travel times and expenses while providing additional sales support. The branch also features a dedicated training room, a branch pickup window for One-Hour Pickup, secure lockers for Pick Up Anytime service and a fully-trained and knowledgeable sales team ready to assist. Redesigning of its Digital Branch In addition to expanding its store network, ADI recently launched a redesign of its Digital Branch to make browsing and purchasing online at ADI easy for dealers. Whether shopping online or in a branch, dealers can expect the same seamless omni-channel shopping experience. With this new location, ADI operates 110 branch locations to serve dealers across North America. In addition, ADI has nine distribution centers strategically located to ensure local branches remain fully stocked at all times.
Globally renowned specialist security services provider, Corps Security has been awarded Carbon Neutral status, after working hard to reduce its carbon footprint and offsetting unavoidable carbon. Carbon Neutral Corps Security has cut its carbon through a range of measures including reducing its diesel fleet Carbon Neutral is a term used to describe the state of an entity, such as a company, service, product or event, where the carbon emissions caused by them have been balanced out by funding an equivalent amount of carbon savings elsewhere in the world. In the past year, Corps Security has cut its carbon through a range of measures including reducing its diesel fleet, reducing air travel, and cutting the use of paper in offices, particularly for tender documents. Increased investment in renewable energy projects At the same time, the organization funded several projects to offset the 477 tons of carbon it produced in the past year, which includes a wind-based power generation project in India. The project in the Indian state of Maharashtra is helping the country to reduce its reliance on coal to meet energy needs, while also creating jobs as wind power is labor intensive. The project was recommended by Carbon Footprint, which provided Corps Security with its carbon neutral certification. Meeting standards set by SECR scheme Corps Security is also working towards rolling out more electric vehicles and installing electric charging points at its London and Glasgow offices. The move to Carbon Neutral status is part of Corp Security’s drive to ensure it met the requirements of the Streamlined Energy & Carbon Reporting (SECR) scheme that came into effect in April 2020. “We wanted to go one step further and demonstrate that we’re a carbon neutral company,” said Mike Bullock, Chief Executive Officer (CEO) at Corps Security, adding “As a company with a 160-year history, we take a long-term view and it’s important to us to ensure that our world is around for future generations to enjoy.”


Expert commentary
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
The Security industry’s role in maintaining safe workplaces has never been more critical. Yet, individual security officers remain likely to drop shifts at the last minute and with greater frequency in the current climate, with illness, lockdown, self-isolation and home-schooling all common reasons for being off. Having a reliable bench with relief officers on hand has never been more important. Sorting drops internally (as opposed to using agency officers) is no longer nice to have to improve margins but is increasingly expected by clients who require consistent support more than ever. Thanks to COVID-related complications, staff sickness, and absence rates could reach as much as 15% this winter and because of this, Controllers can no longer assume they know how many Security officers are going to be able to turn up on any given shift. The truth is traditional static, fixed schedules, and standard workforce management software can’t resolve blow-outs or unpredictable demand with any degree of reliability. It is too rigid and inevitably operates too close to maximum capacity to give scope for an adequate response. Agency officers By using agency officers, Controllers find themselves stuck in a cycle of relying on them and allocating valuable time to filling shifts rather than dealing with the root of the staffing issues. Agency officers are also expensive and need to be trained, with each new officer having to be familiarised with site procedures before starting a shift. By avoiding agencies businesses can not only save money but also the relentless job of ringing around to fill last-minute gaps. Agency staff also heightens the risk of internal officers catching COVID by increased mixing with outside staff members. Static staffing Static roles have a fixed rota pattern and are needed in place no matter how low or high each site requires So, what can Controllers do to avoid agencies but also ensure they have the staffing levels they require? The solution lies in rethinking the approach to static staffing - or staffing by fixed-schedule, permanent team members. In short, the answer is to set full-time staffing levels to the minimum required for operational stability and use a bench of dynamic reserves to cover all other levels of demand. Static roles are those that have a fixed rota pattern and are needed in place no matter how low or high each site requires. Dynamic roles, in contrast, are those roles that can be filled from a pool of people who work non-fixed hours. Once minimum full-time staff requirements are determined then Controllers can begin mapping the dynamic reserves needed to build a bench of officers. How to build a bench Choose areas of the business (by client contract or region) that will benefit most. As a guide, look first where any agency usage is significant. A bench isn’t a line-up of second-rate substitutes - it’s an opportunity to build a talented flexible workforce that wants or needs to be able to work non-standard hours. By empowering bench officers with choice over how and when they work, businesses will see less staff turnover and be able to fill shifts quickly and easily with the right people. By taking into account the preferences and skills of the workforce businesses can intelligently match available officers to the right shifts for them. This helps to build better teams that work well together and allows officers to choose the shifts that suit them best. There has never been a better time for recruiting additional bench staff. This may seem an odd strategy during a recession, but with unemployment levels at a high and incentives from the government to employ apprentices, now is actually the perfect time to look at what additional skills each team needs to offer high levels of service. With the option of flexible contracts and many officers looking to be able to fit work into their busy lifestyles, recruiting additional officers to be part of a bench is a win-win situation. Flexible working options Dynamic staffing gives maximum responsiveness and efficiency but it is complex There are further advantages of internally filling roles, especially during the pandemic, such as peace of mind that officers aren’t mixing unnecessarily with outside staff, reducing the risk of exposure to the virus. This is especially important for those who live with or are high-risk people themselves. In addition to this, by offering flexible working options, officers can feel empowered and happier; we live in a flexible and personalized society so why shouldn’t this thinking be applied to our working lives? By giving officers this dynamic option, many who have other responsibilities such as childcare or aging relatives to care for can still enjoy working and contributing to society. This way of thinking is inclusive, empowering, and a lifeline for those who are juggling different factors. Dynamic staffing software Dynamic staffing gives maximum responsiveness and efficiency but it is complex. The moving parts involved - the volume of officers, their availability, the necessary skills, performance feedback - is hard enough when setting schedules in advance. Throw in last-minute blow-outs because of sickness, timetable clashes, and operational needs, and the sheer complexity can cause an operational meltdown. Dynamic staffing software can help take the operational headache away. Treating officers equally Lastly, it is important that all officers are treated equally, whether full time or bench. Controllers and the reputation of the business rely on these bench officers to respond to unpredictable needs, they aren’t a band-aid, they are the business and their performance depends on their satisfaction and retention.
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand For Video Surveillance And Security Products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable Video Monitoring Solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
Security beat
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
Case studies
Globally renowned security video wall technology and audio visual solutions expert, Ultimate Visual Solutions (UVS) has announced that the company has secured its first contract in Poland, as part of a concerted sales drive across Central and Eastern Europe. The project deal, for a client in the energy sector, is to supply a control room with UVS Lucidity video wall controller technology. This deal takes the number of countries where Ultimate Visual Solutions has worked in or supplied equipment to 17 in the last two years. UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology during lockdown, to a client brought to UVS by the audio-visual distributor, Business International Group. The AV distributor, based in Warsaw, Poland provides professional solutions, devices and audio-visual accessories to a wide range of clients. UVS technology will be at the heart of a new operations center, where it will be providing the monitoring of key Supervisory Control And Data Acquisition (SCADA) systems and other critical data. Monitoring of SCADA systems and critical data Business International Group was introduced to Ultimate Visual Solutions by Pawel Religa, the UVS representative in Central and Eastern Europe, who was recruited to take advantage of the region’s fast-growing audio-visual markets. He was given technical support by UVS’s certified and authorized Eastern Europe pre-sale and after-sale service support partner, Robert Chlebowski of SIGE Poland. Pawel Religa has a wealth of experience in the AV sector, with previous employers including, Edbak (EDBAK Sp. Zo.o.). He is focusing on Russia, Poland and other key parts of the European mainland. Live demonstrations of UVS technology Pawel Religa commented, “The fact that Ultimate Visual Solutions (UVS) were able to provide Business International Group and their end client with very specific online live demonstrations and evaluations of the proposed UVS technology, and using the exact same SCADA application as the end client has implemented, convinced the end client that it was providing the correct solution.” Pawel further adds, “Ultimate Visual Solutions support during the sales, procurement and installation cycle has been excellent and Business Group are looking forward to a long term business relationship.” UVS remote services suite Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility Earlier this year, Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility, in order to provide full video wall technology evaluations for partners and their clients, even in lockdown or self-isolation due to the COVID-19 pandemic. Steve Murphy, Managing Director of Ultimate Visual Solutions (UVS), which is based in the Business First - Burnley Business Centre, said “This contract is the first to come as a result of the many proposals we have been doing during lockdown for Business International Group in Poland, which have benefitted greatly from our ability to provide online demonstrations.” Video wall displays and AV solutions provider Steve Murphy adds, “The investment we made at the beginning of 2020 in our remote demonstration and remote support capability is proving invaluable and has contributed to a very strong finish to 2020.” Ultimate Visual Solutions (UVS), which has its headquarters at the Business First - Burnley Business Centre in Burnley, United Kingdom, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It changed its name from eyevis UK in September 2018, following the acquisition of eyevis GmbH by the Leyard Group.
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles. Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory. HID Trusted Tag Services HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays “HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service. HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service. Anti-counterfeiting technology Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services. “With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilize this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.” NFC technology and cloud authentication services “HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global. Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
Border Caravan Storage, a family run business that offers storage for 170 caravans, motor homes and trailers has been operated by Keith, Alison and Helen Rogers for over 15 years. The site used an access control system to control access to the site, but there wasn’t an ideal method of tracking which units were on site, at any given time. The management team had been using a manually operated display board that was prone to error, so they decided to look for a reliable automatic method of identifying which units were on site. Airlock system with uPASS long-range reader The Border management team spoke to Paul Evans of BTT Comms (ex MMV), who suggested using Nortech’s airlock system, where vehicles have to pass through two separate electronically controlled gates to enter or exit the site. The existing drivers’ access control fobs are used alongside uPASS tags, which are placed in the side window of the caravans for detection by the uPASS long-range reader. The system has been recognized by CaSSOA, who endorse the system giving the highest level of security possible If a caravan passes through the first gate, the second gate will only open if the uPASS tag and the driver's fob are both detected and provide a valid match. The information is also relayed to a specially designed asset management system that keeps a real-time log of all units on and off the site. High level of access control security This system has been recognized by CaSSOA, the Caravan Storage Owners’ Association, who endorse the system giving the highest level of security possible, which is recognized by insurance companies, thereby reducing insurance costs for caravan owners. Benefits Simple and reliable means of monitoring the movement of caravans on and off the site. Reliable long-range tag detection avoids manual intervention and reduces running costs. Enhanced security reduces insurance costs for caravan owners. Helen Rogers of Border Caravan Storage stated, “We are very pleased with the new system which provides information in real time and we now know which caravans and owners are on site at any time giving us total peace of mind.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorized and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorized to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorized fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilize the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorized entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
Leonardo’s helicopter rescue and law enforcement fleet grows stronger in the country adding further AW119s to the AW109s and AW139s already used by other agencies. The AW119Kx helicopters are expected to progressively arrive in Brazil to carry out a range of roles including transport, rescue, emergency medical service, firefighting, surveillance and law enforcement. Nearly 190 Leonardo helicopters fly in Brazil today performing a range of roles including corporate/private transport, law enforcement, public services, offshore transport, and naval applications, supported by a growing level of localized maintenance services. Over 350 AW119 helicopters have been ordered by over 130 customers in 40 countries, many of them for law enforcement, rescue, public service and military tasks. Emergency medical service Leonardo announced that the Polícia Rodoviária Federal (PRF) of Brazil will introduce into service six AW119Kx single engine helicopters. The first aircraft is expected to be introduced in Brazil beginning next year, with the delivery of the remainder helicopters to the operator planned to be followed shortly after. The AW119Kxs will be operated by the Air Operations Division (DOA) from its bases in the five regions of Brazil The AW119Kxs will be operated by the Air Operations Division (DOA) from its bases in the five regions of Brazil to perform a range of missions including transport, rescue, emergency medical service, firefighting, surveillance and law enforcement. The selection of the AW119Kx by the PRF was made following a rigorous assessment of technical capabilities to best meet the law enforcement agency’s needs. Public service operators The handover of these helicopters will further expand the fleet of Leonardo helicopters used by law enforcement, rescue and public service operators across Brazil which already includes the AW119 single engine type in addition to the AW109 light twin and AW139 intermediate twin models. The helicopters will feature an advanced customized configuration including, among others, a Garmin G1000NXi glass cockpit, an infrared capable electro-optics system, rescue hoist, cargo hook, bambi bucket to counter fires, rappelling kit on both sides for special forces operations, advanced communication systems. Law enforcement To date there are over 190 Leonardo helicopters of various types operating in Brazil performing many roles including: corporate/private transport, law enforcement, public services, offshore transport, and naval applications. As the success of Leonardo’s product grows further, the company is committed to further strengthening its existing level of localized services with the establishment of a new regional support center, run by Leonardo do Brasil, in Itapevi, 30 km from São Paulo whose groundbreaking was celebrated in February. The new support center will expand the services already provided by the existing facility headquartered in São Paulo. Enhanced situational awareness Over 350 AW119 helicopters have been ordered by over 130 customers in 40 countries Leonardo is committed to serving and protecting communities around the world, contributing to their sustainable growth by leading in next generation technologies. Partnering with Governments, private organizations and industries for the best security and safety capabilities is a cornerstone of Leonardo’s Be Tomorrow 2030 Strategic Plan. The AW119Kx is one of the best in class single engine helicopter today available in the market, featuring a state-of-the-art avionics system for enhanced situational awareness, mission effectiveness and safety. The AW119Kx has a large cabin which is able to accommodate up to six passengers and redundancy of all critical systems that are typically available on twin engine aircraft, ensuring outstanding reliability and safety. Public service agencies The AW119Kx is perfectly suited to perform many roles including EMS, law enforcement, utility, firefighting, passenger transport, training and government/military duties. Over 350 AW119 helicopters have been ordered by over 130 customers in 40 countries. A number of law enforcement, public service agencies or armed forces around the world have chosen or are already using the AW119 in Brazil, USA, Chile, Mexico, Ecuador, Portugal, Finland, Latvia to name a few. A variant of the AW119 was selected by the United States Navy in January to train the country’s next-generation of naval aviators.


Round table discussion
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
As a subset of the larger economy, the security industry is bound to feel the effects of an economic downturn. Such was the case in 2020 when the COVID-19 pandemic undermined economic growth and presented a brand new set of challenges to business. The security industry has been able to pivot toward emerging opportunities, but that success has been offset by broader economic challenges. We asked this week’s Expert Panel Roundtable: What impact, positive or negative, has the larger economy had on the security marketplace in 2020?
Should security spending be a one-time capital expense or as an ongoing operating expense? At first glance, the question appears to be an accounting issue with little impact on the actual equipment or systems involved. However, as security professionals seek to cost-justify new systems, the question may be central to providing the “best security for the money” and a system that fits the company’s continuing needs. We asked this week’s Expert Panel Roundtable: Should security be a capital expense (CAPEX) or an operating expense (OPEX)? Is the trend shifting and what is the impact?