Soloinsight, the workflow automation platform company announced the opening of its new location in Charleston, South Carolina named The Workflow Innovation Center. The opening signifies growth and an increased interest in innovative workflow automation solutions, such as Soloinsight’s flagship platform, CloudGate, which addresses the security and facility automation needs specifically to PIAM, VIAM, and space reservations. These systems enhance the way departments interact with the life...
Redline, an Air Partner company and a provider of global security solutions, continues to win business with airport customers as they scale up operations in anticipation of increased international travel. Doncaster Sheffield Airport has signed a new three-year contract for a digital Security Management System (SeMS), while Liverpool John Lennon Airport has renewed its SeMS contract for an additional three years following the success of the tool over the past two years. Redline's SeMS focuses on...
Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs’ Association's (NSA) annual conference and exhibition – NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition. NSA 2021 Annual Conference and Exhibition The annual conference is an opportunity for...
In-person training sessions were largely out of the question during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?
The Student Loans Company (SLC) has spent over 76,800 pounds on cyber security training for its staffers, over the two most recent financial years (FY 19/20, FY 20/21), according to official figures. The data obtained and analyzed using the Freedom of Information (FOI) Act by Griffin Law, the niche litigation practice, shows that nearly 20,000 specialist courses were completed in areas, such as phishing, password protection, bribery, corruption, and privacy standards. The data shows that 9,334...
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced they will be displaying contactless security doors and turnstiles, including a new optical turnstile, the Speedlane Compact, in booth #8037 at the ISC West exhibition in Las Vegas on July 19-21. ISC West is the largest security event in North America, bringing together thousands of security and safety professionals for networking, education, and discovery of new technology. All of...
Installers and specifiers are still not fully aware of the many options available to them to help manage social distancing and limit direct contact with ironmongery and doors, says the ASSA ABLOY Opening Solutions UK&I. In line with a recently updated guide from the Guild of Architectural Ironmongers and Finishes and Interior Sector, which outlines how business owners can use partitioning and ironmongery to help manage social distancing, ASSA ABLOY’s extensive portfolio means its products can help with these issues in a number of key ways. Top 5 ironmongery tips “During these times, it’s no surprise that installers and specifiers are being asked about the most suitable products to fit,” says Eryl Jones, Managing Director of the ASSA ABLOY Door Hardware Group. “It’s critical to advise decision makers on practical product choices, which not only meet the needs of the here and now, but which also provide long-lasting, compliant solutions too.” “For existing hardware, the truth is nothing will beat a regular and thorough cleaning routine. However, for new installations, there are a variety of considerations that installers and specifiers will want to bear in mind when advising their customers. Here are our top ironmongery tips on how to manage social distancing and limit contacts with doors.” Seek specialist closing devices To minimize contact with a door, many will be tempted to keep doors held open. This, however, must not be done with fire doors, but this challenge can be overcome with electromagnetic hold-open units. Connected to the building’s fire alarm system, these will automatically release in the event of a fire, helping to keep people and property safe. ASSA ABLOY’s DC300G-HF door closer has the option to not only choose hold-open but free-swing functionality too ASSA ABLOY’s DC300G-HF door closer is commonly specified for these applications, with the option to not only choose hold-open but free-swing functionality too. This enables the door to operate without any resistance, so it can be left open in any position. However, just like with the hold-open feature, should a fire alarm be activated, the electromagnetic feature will release the door and ensure it’s closed securely. Provide personalized keys Users sharing keys can quickly increase the spread of bacteria and germs. An access control system that employs individual keys puts a stop to this and simplifies key management too. Electromechanical solutions use high-end micro-electronics and programmable keys and cylinders to overcome this challenge. ASSA CLIQ® Remote is one such system. A popular, award-winning solution, it allows all users to have their own personalized keys for doors, eliminating the need to share keys. A recent success story has been with the Hean Castle Estate, with ASSA CLIQ® Remote ensuring managers stay in control of access rights across the site at all times. Another long-term benefit of the system, according to Trustee David Lewis, is its flexibility. “As the Estate expands, the ASSA CLIQ® Remote system can grow with it,” he says. “The system is now simply part of the infrastructure of the Estate; should we need more cylinders or padlocks added to it, then this is an easy and hassle-free process.” Adopt anti-microbial solutions Anti-microbial solutions, or touch-safe as they’re often called, offer a proven way of preventing bacteria from spreading. In the current climate, it’s unsurprising that installers and specifiers are receiving an increased number of enquiries about these solutions. It’s worth noting that these products might not offer the best long-term solution, as they can lose their potency over time. Nevertheless, they are easy to install and cost-effective. Customers might also want to consider anti-viral copper tape products, which simply wrap around a clean door handle, for a quick, temporary touch-safe solution. For example, UNION has developed GripSafe to meet this need, which has been proven to inactivate 99.98 percent of corona viruses. Don’t forget about ancillary products From concealed hinges to concealed door closing devices, ASSA ABLOY has a range of products When considering ironmongery and doors, it’s can be easy to forget about other ancillary products that can help limit and mitigate the risks of spreading bacteria. If there are concerns around products that could provide surfaces where bacteria may collect, then concealed products offer an assured solution. From concealed hinges to concealed door closing devices, ASSA ABLOY has a range of products available for guaranteed peace of mind. Another factor to think about is signage. Given the current climate, specifiers may want to consider signage relating to hand washing and sanitizing, social distancing, and other measures that can be taken to prevent the spread of germs. Making sure products are up to mark While not directly relating to helping manage social distancing or limiting contact with doors, the final tip is on product marking, as it’s vital that solutions with the appropriate product marking are being specified and installed. With the new UKCA and UKNI marks introduced from 1 January 2021, it’s crucial that installers and specifiers understand the implications for products that do not have the correct marking in place. Not only will product marking be invalidated, but the potential implications for all those involved throughout the supply chain could be very serious, including significant fines and penalties. Third-party marking ASSA ABLOY is taking all the appropriate steps to ensure its products have undergone the correct third-party marking for goods being sold into Great Britain or Northern Ireland. Those with questions or concerns around ironmongery product marking should not hesitate to contact the ASSA ABLOY team to discuss in more detail.
Greece makes a dynamic comeback in the field of the international defense exhibitions, opening a new era of these events, after the COVID-19 pandemic. Under the auspices of the Ministry of National Defence (General Directorate of Defence Investments and Armaments) and the Ministry of Maritime Affairs and Insular Policy, and in close cooperation with SEKPY (Hellenic Manufacturers of Defence Material Association), DEFEA will take place from July 13 to 15, 2021, at the Metropolitan Expo Exhibition Centre, in Athens, Greece. DEFEA So far 312 industries from 21 countries have confirmed their participation, while the Hellenic Ministry of National Defence has issued 63 official invitations to their counterparts, as well as to high level military delegations. A list of the exhibitors can be found on the exhibition’s official website. DEFEA looks forward to becoming the meeting point for the entire defense industry DEFEA looks forward to becoming the meeting point for the entire defense industry, facilitating interstate contacts, technical and geostrategic briefings and international cooperation. Access to global markets Strategically located in Greece, one of the oldest member states of NATO and the European Union, DEFEA offers the ideal access to Eastern Mediterranean, Middle East, Asia, and Africa regions, as well as Europe and USA. It should be noted that this first DEFEA exhibition is taking place, while Greece has a new extensive defense procurement program under way. Interested individuals shouldn’t miss the opportunity to visit the DEFEA exhibition. Registration has already opened.
Industry-renowned video surveillance outfit, Cloudview, has unveiled its latest state-of-the-art, cloud-based solution to the CCTV market. Buoyed by two successful funding rounds, Cloudview’s latest cloud video recording system (CVR) is now ready for launch. Cloud video recording system (CVR) This next-generation technology unifies, manages, and securely consolidates smart-triggered events from IP CCTV cameras in any location. Data is stored safely and is always accessible. Built from the ground up, the CVR utilizes British technology with military-grade data security and ‘privacy by design’ at its core. Cloudview’s CVR enables the capture, storage, and management of visual data, using the Cloud Cloudview’s CVR enables the capture, storage, and management of visual data, using the Cloud and securely consolidates visual data from any number of CCTV systems, into a unified, encrypted account, held on secure cloud servers and supported by Amazon Web Services. All data is hosted within the United Kingdom and Cloudview’s role-based access controls allow businesses to manage their visual data, so only users who require to see certain content are allowed to, helping businesses with their GDPR compliance. Compatible with IP-based cameras and system Compatible with virtually any IP-based camera and system, the cloud video recording system offers smart detection to maintain an active CCTV network and minimize system downtime. The Cloudview CVR can support business transformations from older analog systems into new IP-based networks. It also overhauls and can unify siloed parts of existing systems into a centrally managed CCTV system. Scalable storage options Optimized to work across any online or mobile network, Cloudview’s CVR offers scalable storage options that can support single camera to large-scale, multi-site operations. Recorded events are then accessible anywhere via the web. By ensuring the safety and security of assets and people, it allows clients to focus on their core business goals. Investor confidence in Cloudview comes hot on the heels of the new Chief Executive Officer (CEO) appointment for the company, Keith Cornell, who brings to the table, over 20 years of executive management, boardroom, and corporate development experience in the global technology market. His brief is to work with both investors and internal stakeholders to manage the company’s ambitious expansion plans. Enhancing people and asset safety The Cloudview CVR is key and represents the natural evolution of security technology" “The success of our recent funding rounds means we can now accelerate our activity to increase traction in the UK market,” said Cloudview’s Chief Executive Officer (CEO), Keith Cornell, adding “The Cloudview CVR is key and represents the natural evolution of security technology. Our central aim has not changed – to keep people and assets safe.” Keith Cornell adds, “Using the Cloud as the foundation means we can provide a system that delivers on that promise. CVR is flexible, easy, compatible and versatile enough for any security-conscious organization, no matter what their specific needs may be.” Future-proof platform He further stated, “With compliance and transparency baked into the system, our CVR solution offers a future-proof platform that will not only change the CCTV industry, but also set the benchmark for all future operations.” Cloudview’s CVR launch comes at a time of growing uptake in remote control and video surveillance, prompted by the ongoing COVID-19 pandemic. 81% of respondents in the 2020 IFSEC Video Surveillance Report believe that video technology plays an important safety role in tackling the problem. Facial recognition and CCTV have seen a 47% increase in use to track potential outbreaks.
Device Authority, a pioneer in identity and access management (IAM) for the Internet of Things (IoT), and Medigate, an IoT device security and asset management company dedicated to healthcare, announce their partnership for securing the Internet of Medical Things (IoMT). Whether to improve the cybersecurity of IoMT, or directly address other challenges, this partnership delivers Healthcare Delivery Organizations (HDOs) important new integrated capabilities. Explosive spending on the Internet of Medical Things (IoMT) is ushering in a healthcare revolution. And COVID-inspired advances to telehealth and remote patient monitoring (RPM) are compounding the trend. But connected medical progress comes with a price. Increased cyber risks IoMT devices and their ability to connect to Healthcare IT systems have also increased cyber risks IoMT devices and their ability to connect to Healthcare IT systems have also increased cyber risks. They must be effectively addressed, as cyberattacks do not just pose a threat to the financial business interests of the HDO but present potential patient safety risks. The Medigate platform fuses its understanding of clinical workflows with unmatched device profiling capabilities and knowledge of authorized operating requirements. This allows the company to instantly detect anomalous device behaviors and trigger appropriate remediation workflows. It also enables instant threat corelations to the HDO's potentially impacted assets. Device Authority’s KeyScaler™ platform uses patented Dynamic Device Key Generation (DDKG) and PKI Signature+ technology to address the identity access management challenges. KeyScaler is especially effective for medical devices, as it secures the medical devices’ identity and offers an automated approach for registration and authentication. Protecting sensitive data These measures protect sensitive patient data and other information exchanged among a wide range of devices – from smartphones to tablets, to large surgical robots or any other device that leverages standard digital certificate protocols. This partnership also opens the possibilities of retrofitting Device Authority's KeyScaler to legacy devices. This has the potential to deliver significant ROI, cost savings and help HDO's more rapidly comply with new and pending security guidance, directives, and regulations. Together we have a robust, secure end-to-end solution for healthcare providers" “We are delighted to partner and collaborate with Medigate who focus on the healthcare and medical industry which has always been a core focus for Device Authority. Together we have a robust, secure end-to-end solution for healthcare providers and medical device manufacturers solving detection, patient safety, compliance, and data security challenges,” said Darron Antill, CEO of Device Authority. Remaining clinically focused “The COVID-19 epidemic showed us the power of health IT, but it also reinforced how critically important it is to manage and protect the devices used to facilitate care– both inside and outside the four walls of the hospital. By integrating Medigate technology with Device Authority’s platform, we’re able to offer capabilities that are uniquely built to meet the NIST functions of Identify, Detect and Protect, while remaining clinically focused and attuned to medical workflows.” “We’re thrilled to partner with Device Authority and for the opportunity to leverage their best-in-class solutions to protect patients, clinicians, hospital leaders, and all others who utilize the IoMT on a daily basis,” said Stephan Goldberg, VP of Systems Engineering at Medigate.
Hikvision, an IoT solution provider with video as its core competence, announces the launch of its brand-new webcam products to the global market. The product family currently comprises four different series – Ultra, Pro, Live, and Value – designed for various scenarios and user groups, and with bespoke feature sets. According to industry analyst firms, the global live streaming market is expected to continue growing significantly in the coming years. The increase in video streaming among citizens and businesses in all verticals is reported as the main driver for market growth, with content creators diversifying their material and activities, and connecting with audiences in new ways. Immersive video conferencing In addition, complete and partial lockdowns during the COVID-19 crisis also positively impacted the live streaming industry. To provide immersive video conferencing and streaming experiences, users need webcams that deliver high-resolution imaging and excellent-quality sound in a range of scenarios. Hikvision has designed and developed its new webcam range to meet this need. The Hikvision Ultra series of webcams are specifically designed for remote conferencing The Hikvision Ultra series of webcams are specifically designed for remote conferencing. The highlight of this series is its PTZ control capability, which offers 5x optical zoom capabilities. This means that users can see meeting presentations or discussions without straining their eyes. Additionally, PTZ control allows users to pan across 330°, helping them adjust their viewing angle easily, without missing a thing. Webcams for remote conferencing Hikvision’s new webcam range also includes Pro webcams for remote conferencing. These are ideal for business professionals, offering an outstanding, immersive sound and video experience, with a sleek design and an elegant, anodized finish. Pro webcams offer an Auto Focus feature and built-in dual-microphone, ensuring that audio and video is always crystal clear during presentations, conferences, or group discussions. The cube-shaped Hikvision Live series of webcams is designed for live streaming, eCommerce, and gaming applications. If a product is being presented in a live program, for example, the webcam view can be changed – both horizontally and vertically – thanks to magnetic mountings on all four sides of the casing. Online education applications The webcam comes with a built-in microphone, which incorporates advanced algorithms These webcams also offer Sharp Auto Focus, which ensures that images of people and objects are sharp and clear at all times. Importantly, the webcams’ ‘touchable supplemental LED light’ feature enables users to adjust brightness in accordance with the surrounding environment. The Hikvision Value series is their range of entry level webcams. These have a compact design, making them perfect for online education applications that connect school teachers and students. The webcam comes with a built-in microphone, which incorporates advanced algorithms to reduce noise and improve sound quality. Its wide-angle lens provides maximum coverage, with no image distortion. This is particularly useful for teachers giving lessons in a classroom, where both the teacher and the blackboard, or wall-mounted screen, can be viewed clearly in a single frame. Third-Party conferencing platforms All Hikvision webcams are driver-free, offering ‘plug-and-play’ installation via a standard USB interface. This allows users to begin conferencing or streaming in seconds. All Hikvision webcams can also be flexibly mounted on users’ equipment, on tables, laptops, monitors, or tripods. Importantly, Hikvision webcams are equipped with dedicated PC-based client software, called HIKIN. Users can use this software for video previews, and to configure image and sound parameters. Notably, the webcams can be used with all the third-party conferencing platforms with video parameters configured using a simple drop-down menu. All Hikvision webcams are delivered with a standard 2-year warranty, giving end-users reliability and peace of mind.
LenelS2 announced a North America distribution agreement with its OpenAccess Alliance Program (OAAP) partner, Splan, a next-generation visitor check-in software solutions company. The agreement enables LenelS2 and its value-added reseller network to provide a more comprehensive touchless building access experience that includes visitor management. Splan’s visitor management solution integrates with LenelS2’s market-leading OnGuard®and NetBox™ systems as well as BlueDiamond™ cellphone credentials to more fully realize Carrier’s Healthy Buildings Program. LenelS2, a global pioneer in advanced security systems and services, is a part of Carrier Global Corporation, the global provider of healthy, safe, and sustainable building, and cold chain solutions. Cloud- and Cellphone-based visitor management “Our agreement with Splan provides our value-added resellers with convenient access to a leading visitor management and check-in solution that is also tailor-made to help address COVID-19-related challenges in offices, schools, event centers, and other facilities,” said Ryan Kaltenbaugh, Senior Vice President, North American Sales, LenelS2. “With the combined solutions, end users can easily adopt cloud- and cellphone-based, secure visitor management, and tracking capabilities.” Situational awareness When integrated with LenelS2 access control systems, Splan enables the provisioning of credentials to visitors, employees from other offices, vendors, and contractors using dynamic credentials or existing proximity cards. When integrated with BlueDiamond mobile credentials, Splan can issue temporary credentials for host-free access. To enhance situational awareness, issued badges may be monitored through the OnGuard and NetBox system interfaces. Easy-to-use enterprise application Splan provides a streamlined process for pre-registration, approvals, notifications, and touchless check-in Splan’s visitor management solution is web-based for ease of use, even for enterprise applications. Splan provides a streamlined process for pre-registration, approvals, notifications, and touchless check-in regardless of device or environment. The feature-rich Splan visitor management solution includes watchlist services, guest Wi-Fi provisioning, SMS and cellphone notifications, and multi-lobby, tenant management from a single interface for visitors, employees, and contractors. An optional COVID-19 package offers touchless check-in, screening, tracking, and notification solutions in support of Healthy Buildings.
As the vaccine roll-out proceeds, people across the UK are counting the days until we can get back to some kind of ‘new normal’. Just as we’ve seen in education and healthcare, the return to the workplace and other public spaces will be accompanied by enhanced sanitization and social distancing measures. To make the return as swift and safe as possible, those of us involved with managing, building and constructing buildings should consider how we can help facilitate and support those measures. Regardless of how rigorously we impose social distancing measures, there will always be some areas where we can’t help coming into contact with each other. Sanitizing door handles Doors, for example – and door locks and handles in particular – are shared by nearly everyone in a building. Even in large, open spaces, we all need to pass through a single entrance. We all use the same door handles and locks – and they provide ideal surfaces for bacteria to breed and transfer. Another solution is for staff to regularly sanitize door handles and locks One solution to this problem is to provide hand-sanitizer dispensers at each door and insist on their use. But this can be difficult to manage in larger buildings where there may be multiple doors and entrances used by both staff and visitors. People could ignore the sanitization rules too. Another solution is for staff to regularly sanitize door handles and locks – but this is a resource intensive option and, again, is dependent on everyone maintaining good practice. Potentially harmful chemicals A longer-lasting way to deal with the risk of locks and door handles spreading disease is to treat them with an anti-viral coating. These coatings come in various forms. Some, for example, slowly release anti-bacterial chemicals, while others have antiviral properties actually built into the material or the coating. Those coatings with built-in antiviral properties tend to be longer-lasting and more effective, and also avoid the issue of releasing potentially harmful chemicals into the environment. A number of different solutions with built-in protection are currently in development, and some already available. Northumbria University, for example (as reported in last Month’s PSB Magazine), is working on a ‘super-hydrophobic’ coating for use on high-contact areas such as handrails and trolleys. Optional antiviral coating Codelocks is working on a coating that attaches biocides to nanoparticles Another British company, Smart Separations, is working on a coating that attaches biocides to nanoparticles, and can be applied to a wide variety of surfaces. While these anti-viral coatings are either still in development or only available to large corporate clients, others are already readily available. Access control solutions provider Codelocks, for example is currently offering an optional antiviral coating with all of its products. Clean by Codelocks is clear coating that uses nanotechnology that can kill bacteria in a matter of minutes. Clean by Codelocks utilizes a process called photocatalytic oxidation. The surface of the coating reacts with light and converts harmful bacteria and germs into a non-toxic compound, resulting in a clean and hygienic surface. Chemical cleaning products The coating has been proven to eliminate the SARS-CoV-2 coronavirus (COVID-19) from surfaces within minutes and is resistant to chemical cleaning products, humidity, and UV exposure – all issues that can cause problems for traditional slow-release type coatings. It’s been said that COVID-19 has been a great technology accelerator. This has been proven true, not only in the areas of vaccine research and development, or in cloud and digital technology but even in everyday objects that we take for granted such as locks and door handles. By building anti-bacterial protection into access control solutions, we can make schools, surgeries, workplaces, leisure centers and other public spaces safer for all.
The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.
Over the past year, companies have had to deal with the COVID-19 pandemic and how it has affected their operations. From new digital services through to security, the response to more hybrid and remote working showed some of the assumptions that we have made over the years, and it required companies to innovate and fill those gaps. Physical and IT security was no exception to this. In the rush to support home working, many IT security teams realised how much they rely on physical security to help with their identity management approaches. To adapt to what is taking place now, identity management has to evolve too. Challenging our assumptions around identity management Identity management involves ensuring that authorized and authenticated individuals can get access to the tools and data they need to work, and restricting access from those that don’t. Identification is establishing who a user is, and then authentication verifies someone is who they say they are through a combination of different methods or factors linked to who they are, what device they are using, what they know, and what they have. Physical security provides an identity perimeter by restricting device access to only those that are allowed to enter a location, whether this is through using technology like smart cards or biometrics through to people managing who can enter the building at reception. With this boundary in place, using a combination of username and password is enough to meet security requirements. A more ‘zero trust’ approach is needed where we trust nothing and verify everything However, the pandemic took this away. For many IT security teams, this showed how much they had taken physical security for granted in their security planning. Alongside having to provide remote access that is secure, these teams had to think about how to manage identities securely as well. The default approach of username and password is not enough when everyone can be working on any device and from essentially any location. Instead, identity has become the new perimeter. The new office is wherever a user and device are, and authentication must change that we can prove people are who they say they are. A more ‘zero trust’ approach is needed where we trust nothing and verify everything. The mindset behind zero trust security is to regard all sources of network traffic, both external and internal, as potential routes for attacks. Therefore, all users and resources must be verified and authenticated wherever they come from, system data must be collected and analyzed for risks, and network access and traffic must be limited and monitored. While it may seem a bit paranoid, zero-trust security is rooted in the realities of the cloud computing age. Multi-factor authentication or MFA can be used to add more types and factors for authentication. So, in addition to something you know like a password, you can use something you have as well. This would typically be a one time password sent to the user’s phone or from a cellphone authenticator app, which fills the role of something they have. Managing this at any scale requires work. For large companies with established processes and identity management strategies, this would be something they could add on as part of that remote working implementation. However, for many smaller businesses that don’t have established IT directories or that have a wide range of different and new applications in place to support, it is more challenging. Everything is different One reason for this is the sheer variety of IT assets, devices, and applications that now have to be supported. Rather than the IT-designed network of machines that is standardized and fully controlled, we today have a far wider range of devices, operating systems and locations in play. Alongside this, there is the issue of controlling access to cloud-based services and Software-as-a-Service (SaaS) applications, which have also grown in popularity. The traditional IT directory that is normally used as the starting point for identity management is not normally equipped to manage the modern identity landscape. Looking at cloud-based directories is therefore a worthwhile step, as these are built to manage Identities, SaaS applications and VPNs and also support both multiple operating systems and the wide range of different devices that today’s users have. From a physical security perspective, identity and access management can be an area to develop. While the need for building access is reduced at the moment, it will return when the pandemic ends. In these circumstances, new approaches may also be needed. For example, fingerprint biometric security processes are popular to fill the requirement around verifying that someone is who they say they are. However, traditional approaches like fingerprint scanners may be less popular as they require users to touch the readers. For high traffic locations with lots of people, that will be a risk. Instead, combining access and identity can be made easier through approaches that take advantage of the new flexibility that pandemic responses needed. For example, using the physical access control support in today’s smartphones can enable organizations to use biometric fingerprint readers or face recognition without having to enforce everyone using the same biometric reader. By linking to phone applications that employees have on their devices, fingerprints or other forms of biometric data can be used to grant access. Thinking about context Looking into the future, many of us are looking forward to things going back to the way that they were before the pandemic. However, there are a lot of things that we had to adapt and use to keep operations running and secure during lockdown that we should continue to make use of. Rather than simply going back, we should look ahead at a more hybrid approach to everything, including security. This includes looking at context for identity and access management. Rather than simple approaches that are either too insecure or overkill for employees, we can set out situations that match the most common working situations and then enforce some rules on when access is granted. For this, we can look at how to use authentication and access control more effectively alongside other security factors. As we move to a more hybrid way of working, this flexibility of approach will be necessary to cope with all the different scenarios that employees will be in The first element here is the devices that users have. Trusted devices can be their own factor for authentication, where a device trust can be set up with a specific user account and linked to a specific device like a PC, laptop or tablet. If the user is not using one of those devices, then they can have an additional factor for authentication used, such as entering a one-time password from their cellphone or a cellphone push authentication. This approach does not restrict users that may need to work from other devices occasionally, but it does protect against theft of passwords or dictionary attacks on credentials. The second element is location. When users connect, they will use an IP address that connects them to a network either in the office, to their home provider, or to a public network. Depending on the circumstances, you can put rules in place on how you manage those connections. For a user that is in the office, they may get access automatically in the same way they used to. With conditional access based on geolocation, user access can be allowed or blocked based on a user’s physical location or challenged with a step-up authentication. For example, your business may be based in the UK and with offices in Europe. Getting an access request from India or China may not be legitimate, so IP addresses from those countries can be automatically blocked. Alternatively, if you do have staff that will travel to those countries, then access can be dependent on using a known device and authentication step before signing in. The approach here is to use conditional access based on identity, location, and device and make access as simple as possible for the user and without causing excess risk to the organization. By looking at specific circumstances and context, you can design your access management approach to fit the user. As we move to a more hybrid way of working, this flexibility of approach will be necessary to cope with all the different scenarios that employees will be in.
For more than 22 years, Open Options, Addison, Texas, has developed access control solutions that connect to leading security technologies to deliver a full-scale solution based on each customer’s unique needs. In 2018, Open Options was acquired by ACRE, which already owned the Vanderbilt and ComNet brands. To find out the latest, we interviewed Chuck O’Leary, President of Open Options. Q: It has been two and a half years since Open Options was acquired by ACRE. Briefly describe that transition and how the company is stronger today because of it. O’Leary: The ACRE transition really focused on integrating our access control solution, DNA Fusion, with Vanderbilt Industries technologies in order to further our reach in the market and enhance our portfolios. With their support, we have been able to accelerate innovations and expand our global reach. Overall, it has been a great experience to be a part of the ACRE organization, and it has opened the doors to new opportunities for us both here in the states and globally. Q: What is "Connect Care" and how does it benefit integrators and/or end user customers? O’Leary: For those unfamiliar with the world of access control, it can often be a little overwhelming when first introduced; however, we strive to make our products as easy to use and intuitive as possible, with Connect Care being no different. Connect Care is a system that has been specifically designed to create the most connected experience in the security market Connect Care is a system that has been specifically designed to create the most connected experience in the security market. It serves as a 24/7 bridge from our customers to services like technical support, platform support, professional services, and training. By providing these options for our customers, we can better empower them with the knowledge and expertise of our DNA Fusion access control system and ensure their success with the product. Q: Who are the new customers entering the market for access control systems in the wake of the pandemic, and how should they be approached/managed differently? O’Leary: Over the last year, there has been a huge demand for access control systems as remote work increased due to COVID-19, and even now, as employees and students are heading back into the offices and schools. Organizations are realizing that having an outdated security system is no longer robust enough for the rapid advancement of technology that we witnessed over the course of the pandemic, and really the past few years. For those who are just dipping their toe into a new access control deployment, the most important thing they can do is to search for a provider who has a solution that is easily integrated, scalable, and provides excellent training and resources. Q: Define the term "touchless access control" and explain why it is gaining a higher profile in the post-pandemic world. O’Leary: The interesting thing about access control is that it has almost always been touchless. Many organizations are looking for robust solutions that are touchless and can be utilized remotely, and it's fairly easy to understand why a solution like this would become widely popular because of COVID-19. Integrators are searching for access control systems that will serve as a proper solution for organizationsThe process of using access control to streamline security infrastructures is not a new concept by any means, but due to the rapid development in technology over the past few years, more integrators are searching for access control systems that will serve as a proper solution for organizations, while still supplying the touchless and remote-based features. Q: What do you see as the future course of the changing technology trends we see in today's market (such as mobile credentials, cloud-based systems, cybersecurity, etc.)? O’Leary: As we continue to tread through the different technological developments in the market today, we are noticing that mobile credentials and biometrics are becoming increasingly popular. As cybersecurity and mobility continue to become more important, we are also seeing the rapid jump to the cloud. By utilizing cloud-based systems, an organization is not hindered by a lack of storage or old software and gains the flexibility to scale their security system as their business grows. Q: How will the access control market look different five years from now versus today? What about 10 years from now? O’Leary: Within the next five years, I suspect that access control will continue to make the move towards cloud-based systems and utilize mobile credentials and biometrics. In 10 years, I think all access control will be open platform and many more organizations will embrace cloud solutions for increased functionality. Also, innovations will continue to be the drivers behind new deployments with some installations being biometrics only and include recognizing fingerprints, retina scans, facial recognition, and voice. Q: What is the biggest challenge currently facing the access control market, and how should manufacturers (including Open Options) be addressing the challenge? O’Leary: One of the biggest challenges facing the physical access control market is organizations actually making the shift to more up-to-date access control systems. Organizations are looking to adopt more digital-focused access control experiencesOrganizations are looking to adopt more digital-focused access control experiences — ones that are focused on integration, newer features, cybersecurity, and ease of monitoring. Access control manufacturers should be addressing this challenge by creating integratable, scalable systems that are easily managed and provide a structured, streamlined approach for an organization’s security infrastructure. Q: What is the biggest misconception about access control? O’Leary: Access control is not a one-size-fits-all solution, and some organizations might have different standards or assets that need protection. This is why it's vital to know the risks your organization faces when speaking with access control providers — to ensure the best possible outcome for your specific needs. It's important to remember that whatever access control system is chosen should proactively mitigate any risks, be easily taught to and successfully used by employees, and be scalable with your organization. No matter the line of work, a proper access control system should streamline the security infrastructure and lessen stress on the security team and employees.
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasizing barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimization. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle traveling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilize portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Invixium, a premier manufacturer of innovative touchless biometric solutions, has been chosen to provide PPG, a global pioneer in manufacturing paint and other specialty chemicals, an automated touchless solution to accurately measure employee temperatures at staff entry doors. When faced with the overwhelming cost of screening employee temperatures during the COVID-19 pandemic, PPG sought to invest in a solution that achieved high accuracy without breaking their budget. Need for integrated screening When the COVID-19 outbreak took hold in the United States in March of 2020, PPG took swift action by hiring additional security professionals to screen employee temperatures before entering their chemical plant. PPG hired multiple professionals to accommodate the thousands of employees that enter and exit the plant every day, costing PPG up to US$40,000 monthly just to manually screen employee temperatures before they gained access via a card-based turnstile system. Management at PPG saw a clear need: integrating automated temperature screening with their access control system would save them hundreds of thousands year over year. Automated temperature screening Integration of temperature screening with the access control system was key quality-of-life feature management wanted PPG reached out to Louisiana Radio Communications (LRC Wireless), a system integrator in the Southeast United States with expertise in chemical plant security. As the plant was already using OnGuard® by LenelS2 for access control, integration of temperature screening with the access control system was key quality-of-life feature management wanted. Enter Invixium Invixium is a manufacturer of healthy access solutions and an OAAP partner of LenelS2. LRC Wireless proposed IXM TITAN with Enhancement Kit to PPG for its automated functionality, integration with LenelS2 for access control, and because rapid automation keeps shift changes fast while saving nearly US$500,000 in staffing costs compared to manual temperature screening solutions. Protecting staff under budget “Businesses must accept that they need for healthy access is here to stay,” said Shiraz Kapadia, CEO & President at Invixium. “Leaders like PPG know it is their responsibility to assure staff that everyone around them is healthy and they are not at risk of illness. Our solution achieves this in a way that is fast and accurate while also minimizing security costs by automating the entire process. The results of this installation and cost savings are proof that automated health screening is the future of healthy access.” Modern solution “Invixium offers a portfolio of really impressive products. These are exciting, relevant solutions that LRC is proud to offer customers like PPG who need a modern solution to a problem we couldn’t even imagine having two years ago.” “Working with Invixium, LenelS2, and PPG’s in-house team, we were able to create a system that met every need PPG had,” said Jacob Brown, Sales Executive at LRC Wireless.
Qognify has announced that VisionHub is being trusted and relied upon by six departments at the University of Vermont - one of the oldest universities in the U.S. The VMS+ is fully integrated and operational across the University’s on-campus install base of 459 video channels (predominantly AXIS IP cameras) and CBORD’s CS Access system. It has been instrumental in helping to reduce unnecessary on-site attendance, as part of the University’s response to the COVID-19 pandemic. VisionHub VisionHub is a VMS+ that enables organizations in critical and highly regulated environments to effectively and efficiently respond to security threats, and mitigate the impact of incidents. It centralizes, integrates, and organizes core physical security systems and sensors into a single video-centric interface, providing heightened situational awareness and powerful incident response management capabilities. Senior Equipment Technician at the University of Vermont, Robert Cochran, explains the reason for deploying VisionHub. Robert said, “We looked closely at different PSIM systems and while they were powerful, they were also very expensive and didn’t match our requirements. What we ideally wanted to find was a VMS that was capable of being our core security management system.” Video surveillance and access control integration During an emergency operations event, VisionHub is the only interface we need to assess the situation and respond" The University is realizing many benefits from having its surveillance cameras and access control tightly integrated. These range from managing real-time emergency events to conducting post-incident investigation and daily on-campus surveillance. “During an emergency operations event, VisionHub is the only interface we need to assess the situation and respond,” stated Robert Cochran, adding “We can view live and recorded camera feeds, as well as access transactions and door information, providing us with a clear real-time picture of people and crowd movement. If any intervention is required, we can control the opening and closing of doors. All of this is done within the one single clear and easy-to-use system.” Remote monitoring live camera feeds Recently, the University undertook a project to provide administrative staff working at the Fleming Museum of Art, Vermont's most comprehensive collection of art and anthropological artifacts, with the ability to monitor live camera feeds remotely. Robert Cochran adds, “VisionHub has been instrumental in helping to reduce unnecessary on-site attendance, as part of our response to the COVID-19 pandemic. Also, from a day-to-day maintenance perspective the VisionHub Web Client is perfect, as it eliminates the need for technicians to move around the campus, as upgrades and authorizations can all be centrally managed off-site.”
Digital Barriers, a globally renowned provider of edge-intelligent surveillance and security technologies, reveals its collaboration with the Future Farms Cymru project, run by North Wales Police. Real-time surveillance solutions Digital Barriers has equipped a farm in North Wales with its real-time surveillance solutions, to demonstrate the role that sophisticated technologies can play in cutting the cost of rural crime, estimated by the National Farmers Union to have reached 54 million pounds in 2019. Rural areas and farmland can be inherently difficult environments to secure. However, Digital Barriers’ scalable and flexible solutions are designed to work in demanding conditions, such as remote and vulnerable locations. AI-based edge analytics Digital Barriers’ video streaming capability and AI-based edge analytics can provide reliable and secure monitoring Proven and trusted within the military and defense domain, Digital Barriers’ state-of-the-art video streaming capability and AI-based edge analytics can provide reliable and secure monitoring, thereby protecting people, places, and assets. The first technology being showcased as part of Future Farms Cymru project is a live streaming body worn camera for the enhanced protection of lone workers. If an incident occurs, the wearer can press the urgent assistance button, which transmits video and a live GPS location back to a designated monitoring center, providing immediate response. EdgeVis Shield The second is EdgeVis Shield, a combination of easy-to-deploy ground sensors that can be used to secure vast perimeters, including farmland containing high value assets. The autonomous system automatically detects when irregular behavior occurs around a perimeter, sending alerts and live video, if a trespasser or vehicle approaches. PC Dewi Evans of the North Wales Police Rural Crime Team commented on the announcement, “In recent years, we are increasingly seeing rural communities and businesses being targeted by criminals. Therefore, it is vital that rural businesses employ the right security methods to protect their assets. Criminals need to know that the farm they’re targeting could be equipped with this cutting-edge technology and they will be almost certainly caught.” Countering rise in rural crime Neil Hendry, Vice President EMEA at Digital Barriers, said, “I am happy that our technology is being used on the front line in the fight against rural crime. The COVID-19 pandemic has adversely affected businesses of all shapes and sizes, with farmers struggling to protect themselves against criminal activity.” Neil Hendry adds, “Future Farms Cymru is an important initiative, and we are delighted to be able help shape and support the future food and farming policy, with our robust video surveillance technology.”
Just like other industries around the globe, the patience of parking operations management has been tested as the usage of parking facilities in urban and suburban settings fluctuated widely over the past year due to local health and safety and occupancy restrictions. As the overall industry looks to spring back from COVID-19 levels, it is also simultaneously looking to transition from traditional analog and on-premise managed operations to solutions that digitize parking operations and provide a more contactless experience. Parking management Investments in digital tools such as platforms that employ computer vision technologies are one solution helping to speed up this digitalization through better management of parking lot occupancy levels, eliminating paper ticketing systems, parking barriers, and other traditional physical elements of commercial parking. Using smart cameras One area in particular gaining steam is the deployment of smart cameras, which can perform functions from license plate recognition to traffic flow detection and speed as well as a host of other utilities. These capabilities are particularly useful in surface lots and parking structures in environments such as airports and sporting venues, to large retail or corporate parking areas. Digital parking experience Munich-based Peter Park, a software developer of parking management solutions, has helped many parking operations begin to migrate to more sophisticated technologies by connecting different digital services such as payment apps, e-charging systems, and navigation providers to further increase security and automation. The company operates in more than 50 different sites throughout Germany and logs more than 25,000 transactions every day. Peter Park’s cloud-based offering is based on the use of license plate recognition technology (ANPR), which often requires specialized license plate recognition cameras to identify a specific vehicle, detect the duration of stay, and integrate with online payment systems for a fully digital parking experience. Flexibility in selection and functionality Instead of LPR cameras, the company is using new smart cameras with powerful microprocessors to fuel intelligent onboard analysis via multiple video analytics applications on the camera. Smart security cameras can provide parking operators with increased flexibility using an open IoT platform Based on an open IoT platform from Security & Safety Things, these cameras can be equipped and flexibly re-equipped with a variety of applications, including license plate recognition, analytics to detect the presence of smoke, fire, ice, and spills, or other hazards within the parking environment, and other ready to install applications that fit the most pressing needs of parking management.“We can not only use the best application for the computer vision task, but we can also pick and combine the best camera types of different suppliers for each setup, taking full use of the broad spectrum of different camera features such as zoom control, as an example,” said Maximilian Schlereth, CEO, and co-founder of Peter Park. Reduced maintenance costs The reduction or elimination of parking gates and ticketing machines can have positive impacts on staffing levels within parking management and drastically reduce hardware purchase and maintenance costs of the parking gates and ticketing devices. Smart vehicle routing Additionally, cameras outfitted with parking management apps can help to direct traffic flow by analyzing the queue of vehicles waiting to enter the facility and pairing them to available spaces or recognizing when a particular parking area is full. They can also assist in controlling the flow of traffic at peak times to prevent jams and long waits at exits or identify the vehicles of VIPs or season ticket holders at an event venue and route them accordingly to the appropriate parking lot. Parking lot monitoring Smart cameras can also help to manage people, providing valuable security and visitor management functions. Crowd detection analytics can detect the formation of a crowd in the stadium parking lot before it escalates into a post-game brawl, and people counting analytics can detect the number of occupants within each vehicle entering a parking area to better determine anticipated attendance of an event or daily occupancy level of a corporate office location. Analytics can also detect individuals holding weapons and selectively transmit related imagery to help remote operators or on-site security personnel assess and address the situation.
The MiQro Innovation Collaborative Centre (C2MI), the largest electronics systems research and development center in Canada, has announced that they recently selected Honeywell for its new thermal screening and risk self-assessment process, at its Bromont, Quebec location, to better sustain operations and to help improve the well-being of building occupants and visitors. Thermal cameras installed C2MI is an internationally known micro-electronics research center that requires 24/7 laboratory access for its team and collaborators. The COVID-19 pandemic challenged its standard operations and ability to provide laboratory access, while limiting potential virus exposure. Honeywell worked with C2MI to install a thermal camera solution to screen elevated skin temperatures and risk self-assessment, in order to streamline building access control, without the need for human interaction. Healthy Building Kiosk thermal sensors Using AI, the Healthy Building Kiosk thermal sensor monitors for trends and leverages variables Using artificial intelligence (AI), the Healthy Building Kiosk thermal sensor monitors for trends and leverages variables, such as the outdoor temperature to provide more accurate readings. If an elevated skin temperature is detected, the staffer or visitor is referred for testing, before being authorized access to the center. The solution allows C2MI security staff to focus on other critical tasks and gives building users shared accountability. C2MI and Honeywell collaboration C2MI and Honeywell are continuously working to refine the technology, in order to create a more efficient and safer access control. C2MI will see a return on investment in less than one year, when calculating the cost of a security personnel dedicated to managing staff access control. “We’ve worked with C2MI to create a custom solution to improve the efficiency of building access and support a return to more normal operations,” said Laura Laltrello, Vice President and General Manager of North America services for Honeywell Building Technologies. 24/7 operations simplified Laura Laltrello adds, “With the implementation of the new Healthy Building Kiosk at the entrance, C2MI’s 24/7 operations are simplified, while allowing the security staff to focus on other critical tasks. We’ve also deployed a continuous improvement process with C2MI to refine the solution to best suit its needs and manage issues such as queuing.” “As a center of collaboration and innovation, C2MI faced two challenges in the past year: the ability to sustain operations, while also taking steps to help make our staff and researchers safer,” said Marie-Josée Turgeon, General Manager for C2MI. Streamlining building access control Our collaboration with Honeywell has allowed us to streamline building entry" Marie-Josée Turgeon adds, “Our collaboration with Honeywell has allowed us to streamline building entry and remove the semi-manual process of individuals’ skin temperature reading, to help provide a safer environment for our teams.” C2MI also implemented health protocols aligned with local guidelines and recommendations, such as a work-from-home (WFH) policy, limiting the number of people in the cafeteria and conference rooms, encouraging social distancing, optimizing disinfecting and cleaning, as well as mandatory procedural mask wearing. Honeywell Healthy Buildings solutions Honeywell’s Healthy Building solutions are part of a comprehensive effort to quickly develop innovative solutions that will help critical sectors of the global economy to recover, without the need to replace existing infrastructure at high costs. Honeywell’s Healthy Building solutions also provide a holistic view of a building’s health, based on the key factors, such as indoor air quality (IAQ), occupant flow, personal protective equipment (PPE) analytics, thermal screening, skin temperature monitoring, social distancing and sanitation efficacy.
Merrion Vaults, an Ireland-based provider of safe deposit boxes, has selected biometric identity verification technology from Iris ID. Merrion Vaults rents safe deposit boxes, like those found at banks, but with a significant difference, customer identities are authenticated through highly accurate iris readers, in order to enhance security. Private safe deposit boxes Merrion Vaults operates private safe deposit boxes in Glasgow and Edinburgh, in Scotland, Nottingham, Liverpool and Newcastle, in England and Dublin, in Ireland. Seamus Fahy, Director, Merrion Vaults, said the iris readers are replacing fingerprint recognition systems for authenticating customer identity. Fahy believes the choice of contactless iris readers was well timed, with the ongoing COVID-19 pandemic. Seamus Fahy stated, “The initial customer reaction to the Iris ID readers has been excellent. The customers love it.” Fingerprint readers It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch" He adds, “It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch. The entire process takes a few seconds to complete. Using the fingerprint reader, customers would forget which finger they registered with or would press too hard or too lightly on the reader. If they couldn’t get access, we’d have to check their names and passwords, and then re-register them. It was a hassle.” According to Fahy, the Iris ID readers are part of a tight security plan that includes video surveillance, access control, turnstiles, intrusion alarms and panic buttons, as well as seismic and water sensors. Employees monitor cameras at each facility and in a system-wide control room in Dublin, Ireland. Iris recognition system Mohammed Murad, Vice President of Iris ID feels the iris recognition system allows rapid and highly accurate authentication of Merrion Vaults customers, due to each person’s unique iris patterns. Mohammed Murad said, “The accuracy, speed and convenience of the Iris ID system are critical for a business that identifies its customers using biometrics. Our system also provides another critical layer of security, ensuring only Merrion customers gain access to the vault. No two people, including identical twins, have the same iris patterns.” Iris iCAM7S system readers The Iris iCAM7S system readers provide a mirror interface with color-alignment indicators guiding customers through the authentication process while capturing iris images at distances of up to 15 inches. Fahy adds that many banks in the United Kingdom are discontinuing safe deposit box service, creating an opportunity for private vendors to fill the gap. Merrion Vaults plans to open new facilities in Belfast, Northern Ireland, Reading and Bristol, England and Barcelona, Spain in 2021. Longer-term plans include locations in cities across the U.S. Merrion Vaults partners with Aditech, which uses dial-in capabilities to remotely configure and set up the system and test it with Merrion Vault’s IT department.
Round table discussion
Large public events were out of the question during the depths of the pandemic. However, public events are likely to experience a resurgence along with a more optimistic outlook in the coming months. In addition, there will likely be pent-up enthusiasm for these events among individuals weary from months of isolation. We asked this week’s Expert Panel Roundtable: What are the security challenges of public events planners in 2021?
In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?
Wireless Access Control eBookDownload
How Security Systems Ensure Healthy Workplaces During COVID and AfterDownload
How Are AI And Analytics Changing Physical Security, And What Should We Expect Next?Download