Door security
SALTO Systems’ access control door lock components and system peripherals are definitely keeping in step with the latest and best new building design trends. The new Dark Bronze option for the XS4 Original and Mini ANSI product range matches some of the new design trends and blends perfectly with both white and dark doors, modern styles, and sophisticated wooden decorations. SALTO door locking solutions The SALTO door locking product range is available in a variety of finishes to comple...
Ensuring the safety of residents and staff in specialized housing environments has always been a priority for those in the sector. Karen Trigg of Allegion UK highlights the steps decision-makers must make to keep occupants in sheltered, extra care or supported housing safe and secure. Whether it’s adhering to fire safety or infection control guidelines, a topic that is never far from ones thoughts at the moment, there are many options that decision-makers can take to ensure maximum safety...
Camden Door Controls, a premier provider of door activation, control and locking products, is proud to bring to market its Virtual Trade Show booth. While the COVID-19 era has prompted many companies to enhance their online presence, the Camden Virtual booth is unlike any other experience to hit the industry. It is built using Augmented Video Reality (AVR) – a software application that adds a layer of computer interface on top of a pre-recorded video presentation. Camden sales representa...
ASSA ABLOY has sold its Italian residential door business within Gardesa to Italy-based Bertolotto and is in the final stages to sell its remaining shutter business. Gardesa is an Italian manufacturer of residential security doors and roller shutters, headquartered in Cortemaggiore, Italy with around 70 employees. The company’s total sales in 2020 was approximately 10 MEUR (approx. 100 MSEK). "Bertolotto will provide Gardesa and its employees and customers with extensive experience and co...
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security...
Alarm.com has released the first commercially available video doorbell that rings without requiring any contact to reduce public health risks and make home visits and deliveries safer for all. The Alarm.com Touchless Video Doorbell is the next generation of video doorbells, combining sleek design with some of the most advanced video intelligence available to consumers for touch-free operation. It is the latest technology innovation from the company that pioneered smart home security. Touchless...
News
Camden Door Controls, a premier provider of door activation, control and locking products, is pleased to announce that its 2021 price lists are now available in both U.S. and Canadian editions. The 100+ page books detail all of Camden's offerings, including product overviews, features, specifications and pricing. In addition, the 2021 price lists re available in multiple formats, including printed hardcopy versions and electronic PDF. Printed price lists are also available by contacting Camden’s Customer Service department. Pricing shown in the 2021 lists will be in effect from February 1st through December 31st, 2021. Door activation devices Camden has maintained the price of the vast majority of its products and, to provide even more value during these difficult times, is providing even more value by reducing the cost of many popular models. Camden's comprehensive product line includes electric locks, Relays and timers, door activation devices, industrial door and gate controls and access control systems and devices. The 2021 Price Lists also feature Camden’s wide range of no touch and low touch solutions, including no-touch switches, wireless fobs, request-to-exit detectors, Lazerpoint wireless devices, as well as low touch push plate switches, and Lazerpoint battery operated transmitter.
ASSA ABLOY announces the availability of Medeco 4 (M4), the next generation of high-security key technology from Medeco. M4 builds on more than 50 years of lock engineering innovation, offering the highest level of protection against physical attack and unauthorized key duplication. Secure cylinders “With M4, we continue the legacy of trust that Medeco has built upon our over 50 years of manufacturing high-security locks in the USA,” said Joseph Kingma, Medeco General Manager, ASSA ABLOY. “Medeco key systems, combined with stringent key control programs and our history of enforcing patents, ensures our customers that every cylinder is the most secure it can be.” Protection against threats Kingma added, “keeping openings secure was the catalyst behind the capabilities of M4.” “With more security features than any key system we’ve ever made and an innovative design that protects against the latest threats like 3D printing, M4 reaffirms Medeco as the name that built high security.” Design and strength M4 cylinders are UL Standard 437 listed for physical strength and high security, with solid brass machined construction and strategically placed hardened-steel inserts to thwart drilling attacks. In addition to tumbler pins that lift and rotate, the M4 design includes four side pins: three-finger pins and one lift pin, which must all interact with the sidebar to open, providing a high level of pick resistance. The patent-pending M4 key design, with its shuttle-pin movable element, also helps protect against the emerging threat of 3D printing for unparalleled credential security. Benefits of M4 key systems More Innovation: The technology built into M4 stretches the boundaries of features that can fit into a single cylinder. More Protection: A movable element on the key engages a lift pin to activate the sidebar for more protection against lock picking, as well as 3D printing or cloning attempts. More Combinations: Side-pin codes allow for a vast number of pinning combinations to support even the largest key system requirements. More Security: Patent-pending key control ensure keys cannot be duplicated without proper authorization.
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced a new continuing education course approved by the American Institute of Architects (AIA) entitled, ‘Closing the Gap in Physical Security: Addressing the Entry’. Architects can view this one-hour presentation in exchange for one Health, Safety and Welfare Continuing Education Unit (HSW CEU) towards their AIA accreditation. The course focuses on the role of security entrances in building design and a physical security strategy, including integration with other security technologies, safety and code requirements, and the impact of pandemics on the entry. Importance of controlling access to buildings The course begins by explaining the importance of controlling access to buildings The course begins by explaining the importance of controlling access to buildings through designs that address securing the entry. Architects learn the risks and associated liabilities that impact an organization when they fail to put effective measures in place to mitigate unauthorized access at their buildings. The presentation also touches on the results of a recent Boon Edam survey that revealed how security professionals perceive the risk, impact and cost of tailgating at buildings. Tailgating occurs when an unauthorized person follows an authorized person into a facility via a swing door and is arguably the biggest physical vulnerability that an organization will face today. Security entrances key in physical security strategy The AIA course continues by classifying security entrances according to their ability to mitigate tailgating, their safety features and how they comply with local codes. There are also discussions around the people and processes necessary to support each type of security entrance and the importance of securing a building in layers for the best overall outcome. Attendees will also see videos that demonstrate the working principles of turnstiles, security revolving doors and mantrap portals as they rebuff tailgating attempts while integrated with third-party access control and biometric devices. Future of security entry post COVID-19 The course concludes with details surrounding the future of security in building design in a post-pandemic world. Architects will learn tactics that include creating separate entry and exit points across a building based on the types of users and utilizing technologies that support touchless entry and temperature screening.
Continental Access, a division of NAPCO Security Technologies and respected security innovator and pioneer in integrated access and security solutions for government, institutions and business, is excited to announce the debut of the all-new E-Access platform. E-Access is a new easy-to-use platform of 1 to 4-Door Self-Contained Controllers with embedded software. It offers hybrid access control in a cloud-based system, with the advantages of an on-premise access system. E-Access is available in 1-Door, 2-Door and 4-Door controller models, fully scalable 8 doors expandable to 256. Mobile app management E-Access is a self-contained system, so there is no software to load and it’s ready out of the box. It features secure cloud-based remote management and/or mobile app management. A set-up wizard guides users through an easy and fast set-up of user and system configuration, auto-populating of holidays, the integrated flat file import tool, and bulk load of users & credentials. The E-Access embedded platform allows for use with any popular browser, including Chrome, Safari and IE. Feature-packed at a value price, E-Access features no-touch Bluetooth® mobile credentials and automated credential issuance; Quad Core Cortex, 1.5 GHz, 64-bit processing with a gigabit Ethernet, each panel retains a copy of database for redundancy; UL294 Series 7th Ed. Listed; and includes a 5-year hardware warranty.
Allegion plc, the foremost global security products, and solutions provider, recently made donations to hunger-relief organizations around the world amounting to more than $500,000. These one-time gifts were designated on behalf of all Allegion employees to help support the growing number of people facing food insecurity in the wake of the ongoing COVID-19 pandemic. Values and financial support “As we close out what’s been a very challenging year for many, it’s important to reflect on our blessings, but also the needs of others,” said Allegion President, Chairman and CEO David Petratis. “If there’s one Allegion value that I know our global team members hold very close to their hearts, it’s serving others, not yourself. Giving financially where we see a great need at our local foodbanks and other hunger-relief organizations is more important than ever given the impact COVID-19 has had on our communities.” Organization network Nearly half of the funds will support Feeding America – the largest hunger-relief organization in the United States – and its community affiliates. The organization has a network of 200 food banks and 60,000 food pantries and meal programs, providing meals to more than 40 million people each year. The remaining financial gifts are supporting additional hunger-relief organizations in communities throughout countries where Allegion operates, like Australia, Canada, Germany, India, Italy, Mexico, and New Zealand, among others. Donations and additional support Allegion and its team members regularly give back to the communities where they work and live. In addition to the December hunger-relief donations, during the calendar year 2020, Allegion provided more than $450,000 in support to community organizations and non-profits around the world, including Habitat for Humanity, the American Heart Association and Ronald McDonald House Charities. The company also contributed nearly $1 million in in-kind security product donations – which included hardware for homes, as well as hundreds of bicycle lights and locks for essential healthcare workers in need of safe commutes to work. Throughout the COVID-19 pandemic, Allegion additionally supported healthcare providers with a total donation of 45,000 masks. Frontline workers “At Allegion, we’re grateful for essential and frontline workers – those servant leaders who are fighting this pandemic and its negative impacts, like hunger, every day.” “And we’re thankful we can give back at a time when it’s needed most,” Petratis added.
Researchers at internationally renowned cyber-security vendor, Check Point have reported a surge in cyber-attacks targeting healthcare organizations across the globe. Since the beginning of November 2020, researchers have documented a 45% increase in cyber-attacks targeting healthcare organizations worldwide, placing the healthcare sector at the top of the hit list for cyber criminals, when compared to all other industries. Surge in cyber-attacks on the healthcare sector The surge in cyber-attacks on the healthcare sector was double the increase in cyber-attacks on all other industries during the same time period, as researchers marked only a 22% increase in attacks on all other sectors outside of healthcare. The increase in cyber-attacks involves a range of attack vectors, including ransomware, botnets, remote code execution and DDoS attacks. Ransomware showed the largest increase and poses as the most significant malware threat to healthcare organizations, when compared to other industry sectors. Cyber-attacks in global regions Cyber-attacks on the global healthcare sector are simply getting out of control" The surges in cyber-attacks on healthcare organizations occurred mostly in Central Europe (+145%), followed by East Asia (+137%), Latin America (+112%), Europe (67%) and North America (37%). As for specific countries, Canada experienced the most dramatic increase with over a 250% uptick in attacks, followed by Germany with a 220% increase. Spain saw a doubling in ransomware attacks on its healthcare sector. Omer Dembinsky, Manager of data intelligence at Check Point said, “Cyber-attacks on the global healthcare sector are simply getting out of control. This is because targeting hospitals equates to fast money for cyber criminals. These criminals view hospitals as being more willing to meet their demands and actually pay ransoms. Hospitals are completely overwhelmed with rises in coronavirus (COVID-19) patients and recent vaccine programs, so any interruption in hospital operations would be catastrophic.” Rise in ransomware attacks Omer adds, “This past year, a number of hospital networks across the globe were successfully hit with ransomware attacks, making cyber criminals hungry for more. Furthermore, the usage of Ryuk ransomware emphasizes the trend of having more targeted and tailored ransomware attacks rather than using a massive spam campaign, which allows the attackers to make sure they hit the most critical parts of the organization and have a higher chance of getting their ransom paid.” Security tips for healthcare organizations to counter cyber-attacks: Look for Trojans – Ransomware attacks don’t start with ransomware. Ryuk and other types of ransomware exploits usually start with an initial infection with a Trojan. Often this Trojan infection occurs days or weeks before the ransomware attack starts, so security professionals should look out for Trickbot, Emotet, Dridex and Cobalt Strike infections within their networks and remove them using threat hunting solutions, as these can all open the door for Ryuk ransomware attacks. Raising guard on weekends and holidays – Most ransomware attacks over the past year have taken place over the weekends and during holidays, when IT and security staff are less likely to be working. Use anti-ransomware solutions – Although ransomware attacks are sophisticated, anti-ransomware solutions with a remediation feature are effective tools that enable organizations to revert back to normal operations in just a few minutes, if an infection takes place. Educate employees about malicious emails – Training users on how to identify and avoid potential ransomware attacks is crucial. As many of the current cyber-attacks start with a targeted phishing email that does not even contain malware, just a socially-engineered message that encourages the user to click on a malicious link, or to supply specific details. User education to help identify these types of malicious emails is often considered one of the most important defenses an organization can deploy. Patch virtually – The federal recommendation is to patch old versions of software or systems, which could be impossible for hospitals as in many cases, systems cannot be patched. Therefore, it is recommended using Intrusion Prevention System (IPS) with virtual patching capability to prevent attempts to exploit weaknesses in vulnerable systems or applications. An updated IPS helps organizations stay protected.


Expert commentary
Electric locking is among the most ubiquitous examples of everyday security. Yet the complexity of electric locks and the advanced technologies deployed to provide simple, dependable and, for the most part, impenetrable locking often goes unnoticed. And that’s a good thing: when we take things for granted, it usually proves they’re fit for purpose. As experts in the field of solenoid actuated designs, we’re okay knowing that remote electric locking solutions are taken for granted and that the design sophistication behind a functional and reliable locking assembly is often overlooked. As readers of this journal will know, security takes many forms. Perhaps the most recognizable application of a security policy is the ability to lock something. A door to prevent access. A gate to control the flow of people or vehicles. Or shutters to guard against theft. Or to unlock a turnstile to allow ingress and egress, as found in leisure centers and museums. Or to switch between either flow direction when required – think soccer match stand access, for instance. In part one of this feature, we look at straightforward electric locking solutions that use solenoid actuators. Straightforward security measures However, while locking can be one of the simplest security initiatives, it’s also capable of being among the most complex where sophisticated measures are called for. In part two, we will cover specialized electric locking technologies and some more unusual security solutions and application examples. Among straightforward security measures is remote locking Among straightforward security measures is remote locking – a function found almost everywhere you look. Unless you’re the proud owner of a classic car, when did you last physically put your vehicle key in the door lock? Remote locking ups the ante for designers who need to incorporate security in an assembly, an application, a product or a system. Solenoid Workhorses Solenoid actuators and electromagnet technologies are the bedrock of electric locks. Remote operation – activating a lock from a distance – is commonplace. Wireless RF transmitters in the key fobs of modern vehicles activate the central locking system. Cards with embedded RFID chips, fingerprint readers and facial recognition systems provide selective access to buildings, typically by either actuating a solenoid lock or releasing a powerful door magnet. You can see examples on the Jubilee and the new Elizabeth (Crossrail) lines on the London Underground. They use electric solenoid-based locks to secure platform access screen doors, only allowing them to open once the underground train has arrived. Solenoid-based electric locking is at the heart of safety-based security in applications such as elevator doors and disabled access lifts, on building hoists, and as interlocking systems for screens and safety covers on machine tools, to name a few. Solenoid-based electric locking is at the heart of safety-based security These are straightforward applications that address a range of issues that come under the general heading of security. Others demand special features built into the electric locking mechanism to meet specific end user requirements. This added complexity can present a design challenge to the inexperienced. Electro-mechanical design engineers invariably have a useful broad knowledge for developing products but not necessarily a core expertise in solenoid technology. One example we like to use is a railway carriage. To design and build that takes a huge breadth of knowledge and expertise due to the many systems and assemblies a carriage comprises. But passenger trains now feature remote electric door locking which must function perfectly – and without which the rolling stock is unfit for purpose. That electric locking subassembly design is a critical feature and a specialist development project. Solenoid actuators and electromagnet technologies are the bedrock of electric locks Shotbolts A generic term used for electric solenoid locks is shotbolts. In these linear actuating units, the solenoid typically moves the bolt directly or through a bell crank to turn the actuation through 90 degrees, or to extend the linear movement of the bolt. They can be built as Fail-safe or Fail-secure models, meaning energise-to-lock, or energise-to-release respectively, which determines the state they adopt in the absence of power. You would want some applications to default to unlock in the event of power loss, and others to default to the locked state. Both types usually deploy a spring to return the bolt in the quiescent unenergised state. Bi-stable is another functionality available. In this design, no power is consumed in either position. A loss of power will leave the device in its last state. Scaling down Some shotbolts are large. Those designed to secure the access ramp on the Solent hovercraft built by Griffon Hoverwork are powerful units – and in that application a weatherproof design is deployed to withstand the saltwater spray and frequent washdowns. But a shotbolt and the solenoid contained within it can be physically quite small and require minimal power, yet still provide highly secure locking in a mortice lock arrangement. This is where the locking assembly starts to become complex Over the years, bespoke designs have been developed for diplomatic bags and Cash In Transit (CIT) cases. Both use small, low power actuators. In the latter application by specialist Cash In Transit equipment manufacturers HDH, intelligent electric lock technology provides unique features – and there’s a range of surprises in store for anyone accessing cash boxes illicitly. Technologies in cash transit solutions include GPS tracking, alarms, remote monitoring and automatic ‘cash degradation’ systems if a case is forced open. Ensuring that degradation systems don’t activate when a case is opened legitimately is equally important. This is where the locking assembly starts to become complex, requiring special design expertise. The CIT solenoid lock uses a 90°actuator to latch, lock and arm automatically if required but can be set to not lock or arm as the actuator travel doesn’t engage with the mechanical latch mechanism by default. Integrated technology solutions inside the case include daylight sensors, surface protection wires inside and out, and reed switches between the lid and the base. All contribute to safety precautions that prevent accidental activation and protect the valuable cargo and the operator. But for first line security, straightforward shotbolt electric locking is still at the heart of CIT cases. Internet of Things Miniature shotbolts are also used in some medical ventilators – a topical subject at the time of writing during the global coronavirus pandemic. They are also increasingly appearing in consumer-level Internet of Things (IoT) applications, being a key component in home automation applications. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available. We dealt with some straightforward technologies and applications here. In part two, we will look at special technologies built into more sophisticated solenoid locks to prevent forced entry, at materials that guard against explosion risks in hazardous environments and even at the use of proportional solenoid technology to manage pressurized gases. Read part two of this feature here.
Modern working life has changed dramatically in the last decade. Driven by the growth of a millennial workforce, working behaviours and communications are more agile, digital and mobile than ever before. Remote working has risen 140% since 2005, a figure that will undoubtedly continue to rise in light of the pandemic. And its benefits are well studied: people are more productive, more motivated, and report a better work-life balance. The traditional office space and the digital collaborative working platforms we access both inside and outside of “work” have changed. In turn, there is a requirement for increasingly sophisticated access control and security products and systems. Today, and in the future, biometrics can play a crucial role in empowering workplaces both physically and digitally. Biometrics: accessing the right area Physical access and alarm systems are the first, and perhaps the most obvious area, biometrics is securing workplace access control – whether it’s to access office buildings, manufacturing floors, or even private rooms and safes. The humble key is easily lost and stolen, yet still represents 80% of door lock security The humble key is easily lost and stolen, yet still represents 80% of door lock security. And while digital solutions are gaining traction, PIN entry not only offers a poor UX, but requires close management, given its vulnerability to loss and misuse. Access fobs and badges pose similar challenges. Say, for example, an employee loses his badge to a restricted lab or highly confidential development centre on his commute - the security of the building is instantly compromised. By adding biometric authentication to cards or fobs, employers need no longer worry about them falling into the wrong hands. Without the correct user to authenticate, access to buildings, business operations and company files remain secure without needing to update any management systems. Moreover, by using this personal ‘on-device’ approach, employees no longer need to worry about the hygiene of shared sensors or PIN pads. Meanwhile, businesses can also avoid the technical and legal challenges of needing to manage a biometric database. A win-win. Touchless access Touch-free biometric solutions are another compelling way biometrics can not only improve security, but the user-experience and personalisation of security systems. Today, many touchless authentication solutions are combining the strong security of iris authentication with facial recognition to offer a compelling balance of security and convenience. This combination also means a reduction in false rejection due to physical changes, as it continues to authenticate even when wearing sunglasses, face masks or in bright sunlight, for example. Touchless solutions can bring benefits to numerous use cases and settings. Firstly, they can be utilized for mobile credential authentication on personal devices for seamless access to company servers, apps, or VPNs. It can also be implemented in traditional physical settings, offering the capability to alter access rights for personnel too. An R&D lab or healthcare setting is a good example here where restricted access to areas is in high demand, but would also benefit from a hands-free, seamless entry. OK computer Computers and laptops sit at the heart of the modern-day business set-up – whether at home, in the office, or on the move. In parallel, the evolution of modern working behavior changes has seen the number of applications, cloud-based services and shared VPN drives used reach an all-time high. While the benefits are numerous, the extensive PIN and password management that accompanies this is problematic. 6 out of 10 users felt they had too many passwords For users, they are a source of frustration and anxiety – our research found 6 out of 10 felt they had too many passwords, and worried about forgetting them. In turn, many are all too familiar with the laborious process of setting a complex password, forgetting it, and needing to reset again after several failed attempts. While complex password requirements (such as requiring capitals, numbers, and special characters) mitigate risk in theory, in practice they create a major point of friction in the user experience and require significant management. From a business perspective, security and cost concerns are even greater. Microsoft reportedly spends around $12 million a month on forgotten passwords. Worryingly, workplace security breaches are increasing too, with 54% of IT professionals reporting an increase in phishing attacks according to a recent Mimecast report. Here, the end-user is usually the weakest link due to easily guessed passwords, complacency, and the use of the same password across multiple apps and accounts. Biometric authentication via unique personal devices such as USB dongles, or by utilizing on-device authentication on a smartphone offers simple and frictionless way to increase security for the enterprise, free up IT teams and offer a better user experience to employees. FIDO-certified solutions are just one compelling solution supporting this. Plus, biometrics can also be used to authorize selected employees to access restricted areas of an organization’s network, protecting confidentiality. Meanwhile, with 80% of smartphones now featuring some form of biometrics, utilising biometric authentication for smartphone applications in the workplace can also be done at a relatively low-cost investment. Getting personal With more flexible working in place, many workplaces now operate a ‘hot desk’ system or share devices such as printers between colleagues. This is another instance where biometrics can be used to simplify access to personalized settings or employee accounts. In the future, this could even be integrated into wider office use cases, such as personalizing the air conditioning preference in meeting rooms or unlocking your personal settings on the coffee machine with a simple touch or gesture. More with multimodality Multimodality layers more than one type of biometric authentication to increase security and improve functionality and ease of use. For example, combining fingerprint with facial or iris to verify someone’s rights to access a secure manufacturing floor. While spoofing a fingerprint is challenging enough, spoofing a fingerprint and iris at the same time is near impossible. What’s more, by combining more than one modality, access control product manufacturers can reduce the false rejection rate (FRR) to deliver even smoother experiences. Secure, seamless authentication For enterprises, adding biometrics needn’t be a full ‘rip and replace’ solution. In fact, it can be added as a complement to existing solutions for added security without creating additional user friction. A biometric card or key fob can replace existing contactless access cards without big investments, or a biometric USB dongle can be added to email or VPN login to significantly enhance security, without infringing ease of use. A biometric card or key fob can replace existing contactless access cards without big investments To meet this demand, our access control service and solution partners are integrating biometrics for a wide range of physical and logical use cases. It’ll be unsurprising that locks and alarms are top of the list, but with the rise of widespread remote working over the last 10 years and the fight against PINs and passwords being led by organizations like FIDO, logical access for VPNs and work and time attendance, for example, are coming to the fore. Overall, biometrics can not only play a role in securing the modern workplace (wherever that may be), but can also give time and money back to IT and security teams. Most importantly, it can be a tool to empower workforces, driving efficiency and productivity through improved convenience and greater flexibility over how, when and where they work.
Safety and security have always been primary concerns for those running large events and gatherings, such as at concert venues or soccer stadiums. However, the Manchester Arena attack of 2017 highlighted that more should be done to protect those visiting these locations. This is the standpoint taken by Figen Murray, the mother of Martyn Hett – one of the 22 victims of the devastating attack. She has been campaigning for the introduction of stronger counter-terror security measures at public venues and has succeeded in gaining government backing for ‘Martyn’s Law’. According to the Home Office, the law would require venues to consider the risk of an attack and take “proportionate and reasonable measures” to protect those in attendance. Murray’s proposal would see increased physical security, such as airport-style metal detectors and scanners, become mandatory for major venues that draw large crowds, as well as training, incident response plans and exercises for staff. The law would seek to tackle the inconsistent nature of security practices currently seen at venues, and bring holistic counter-terror practices to the fore. Introducing airport-style security measures at concert venues isn’t a fix-all solution However, introducing airport-style security measures at concert venues isn’t a fix-all solution. The ecosystem of these locations must be considered and responded to accordingly. Adding extra checkpoints in areas with a high flow of people will not only result in additional queues and disgruntled visitors, but may have more disastrous consequences as large crowds are typically the target of terror attacks. Disruptive security measures may move the mass of people from inside the venue, where people will have had to pass through some form of security – if only just a bag check – to outside the venue, where there are typically no security measures in place. Disrupting threats with enhanced security So, what can be done to enhance the protection of those attending these locations? Investment into technology that can provide an additional layer of security without being intrusive is key, and facial recognition is one such tool. Security teams can use this innovative technology to scan crowds or queues for a sighting of a person of interest, whose biometric data is included on a watch list of known individuals. As well as providing an additional layer of protection, this tool can provide peace of mind for security teams who can monitor those who have not yet entered the venue or are waiting outside. When the facial recognition system identifies a potential match, staff must be prepared to act – as the system will never make the final decision over a person’s fate. They can analyze the picture from the watch list with the video of the individual identified, decide whether the detection was accurate and then interact directly with the person of interest. The level of contact may be as simple as asking for proof of identity and if adequately able to verify who the person is, no further action is needed and any biometric data is removed. Alternatively, it could lead to the acquisition of a known criminal, providing valuable intelligence of any immediate threat. When the facial recognition system identifies a potential match, staff must be prepared to act The real benefit of facial recognition is that response can be proactive as well as reactive, whether it be from fixed surveillance cameras or mobile devices such as body worn cameras. Devices capable of live streaming coupled with analytics such as facial recognition, offer an invaluable surveillance tool, allowing security teams and first responders to react quickly and more effectively to an unfolding situation, all in real-time. Control centre staff are still vital in this circumstance, but are able to work with heightened situational awareness thanks to the live streaming aspect. It allows them to more accurately assess a situation and therefore make decisions based on all of the information at hand, with outcomes that will be far more effective. For example, the information relayed to the emergency services will be more exact in terms of what happened, where and who was involved – rather than being based on fragmented eyewitness accounts. Planning ahead Even though it isn’t yet official, Martyn’s Law is already making waves in the industry – with Manchester City Council pledging to adopt the law early and the security minister, home secretary and prime minister all “100% behind” the proposal. Despite its early stages, operators of concert venues and stadia must start forward planning and enhancing security measures ahead of the government beginning to consult on the law in the spring. Only time will tell what the full legislation will entail, but we can all agree that action is necessary. In order to be as effective as possible, the law should not only mandate metal detectors and bag searches, but technology such as facial recognition and body worn cameras that can work to enhance these other measures and elevate the human response.
Security beat
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Case studies
Milton Keynes University Hospital has installed a Videx VX2200 system, one of the UK’s renowned access control manufacturer’s flagship door entry systems with 5178 hands free audio units and touch free entry points. Through opting for a touch free entry solution, the hospital has been able to reduce physical contact between people to help stop the spread of COVID-19. Four independent units were installed by ST Fire and Security in different buildings of the hospital. One was installed at The Campbell Center, a 38-bed acute inpatient mental health unit, another system fitted at the hospital’s dental surgery, a system fitted at the entrance of urgent care and a final one at Eaglestone Health Center which is a specialist Child and Adolescent Mental Health Service (CAMHS) facility. Audio apartment station Simon Turpin, Owner of ST Fire and Security, said: “The Videx VX2200 system with hands free audio apartment station and touch free entry points delivers huge benefits to the hospital by safeguarding patient, visitor and NHS staff safety as well providing easy and convenient access. The new system reduces waiting times as when a visitor uses it, someone in the building is immediately notified and will come to see them to complete entry.” “The Videx kit is the only one on the market currently that can offer convenient access in a touch-free way - they’re highly useful in helping the hospital ensure people stick to the designated one way system in place.” Touch free access Proximity access control can be added allowing authorized personnel to enter buildings touch free" As well as providing touch free access, the Videx system has replaced an existing system that had failed, affecting secure and convenient access to and from The Campbell Center. The Videx solution means no patient or member of staff is waiting for access into the secure mental health unit, safeguarding patients and employees. Ben Davies, South East Sales Manager, Videx UK, said: “Our touch free access control range has proved hugely popular in recent months as minimal contact remains key to reducing the spread of the coronavirus. The range offers both exit buttons and entrance panels in a touch free format using infrared sensor technology, providing a no touch solution for businesses as they focus on creating a COVID secure environment for their employees, partners and customers.” Bespoke entry panels “Proximity access control can be added allowing authorized personnel to enter buildings touch free, which is particularly useful for hospitals and other NHS buildings such as GP surgeries and urgent care facilities. We can also provide fully customized options, offering bespoke entry panels and exit buttons that are in keeping with the surroundings of the building whether that’s a specific hospital ward, GP surgeries, or dentist practices.”
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
HID Global, the globally renowned company in trusted identity solutions, has announced that Bay State College safely brought its students back to its campuses in Boston and Taunton, Massachusetts using a digitized contact tracing solution that includes HID Bluetooth BEEKs Beacons to provide real-time location services. HID Bluetooth beacon The HID Bluetooth beacon is in the form of a simple badge holder that is used to carry existing ID badges for students, faculty, staff and guests. The beacons are part of a robust solution that makes it possible to quickly and easily perform contact tracing, removing the manual and time-consuming effort to identify who has been in contact with whom on campus. “Contact tracing is a key component for safely operating our campuses and considered by health departments to be one of the most important efforts to help slow the spread of COVID-19,” said Jeffrey E. Myers, Chief Information Officer with Bay State College. Contact tracing solution He adds, “HID BEEKS beacons are carried by each person on campus as part of our solution that enabled us to safely resume in-person classes and keep our campus operational should isolated parts of our community find themselves infected.” The HID BEEKS Bluetooth Low-Energy (BLE) beacons provide the starting data that Bay State College’s contact tracing solution uses to calculate the time, place, and proximity of faculty, staff, and students while on the college’s two campuses. HID BEEKs Beacons HID’s offering is part of a broader platform that provides smart building and optimization capabilities" The information from the beacons enables college administrators to comply with state and local occupancy mandates and, when needed, rapidly respond to cases. Logs are maintained only for the 14-day period required for contact tracing, and the university has adopted strict privacy policy guidelines for data use and access. “We are very pleased that Bay State College has used HID BEEKs Beacons to help streamline and accelerate the often daunting task of contact tracing,” said Mark Robinton, Vice President of IoT Services at HID Global, adding "In addition to creating a completely digitized approach to this process, HID’s offering is part of a broader platform that provides smart building and optimization capabilities that extend well beyond today’s pressing need to stem the spread of COVID-19.” HID Location Services HID BEEKS Beacons are part of a complete HID Location Services for Workplace Safety that also simplifies and streamlines how to manage social distancing. These workplace safety solutions build on the company’s comprehensive HID Location Services platform, deployed by Fortune 500 companies worldwide, to manage building occupancy, optimize office and facility space, improve energy efficiency and enhance security. The platform can also monitor assets as well as the condition and health of industrial equipment.
MSC Mediterranean Shipping Company S.A. (MSC) is the world's second-largest shipping line in terms of container vessel capacity. It operates 480 offices across 155 countries worldwide with over 24,000 employees. MSC’s shipping line sails on more than 200 trade routes, calling at over 315 ports. Challenges MSc searched for options to manage attendance in the office spread across 15+ locations. A central server that can handle the capacity of 1000+ users and can seamlessly integrate with their accounting software - SAP. Additionally, they required a fool-proof solution that can assist them to manage multiple shifts with automated shift correction options and work hour’s calculation in overnight shifts and more. Solution The offered solution deploys the access control solution that enables complete security of all their units Matrix addressed these challenges by proposing a Door Controller for the locations connected by a central platform. This Time-Attendance Solution helps them to procure accurate attendance details of an employee in no time. Furthermore, this attendance data is integrated with accounting software - SAP for seamless attendance and payroll management. The offered solution deploys the access control solution that enables complete security of all their units. COSEC PVR Door Controller - a contactless biometric that is engineered to offer the utmost security, eliminates the risk for forgery or identity duplication. Results Effortless attendance management of all location from head office Multiple connectivity options Streamlined shift allocation and automated shift correction Seamless integration with SAP Customized attendance policy formation Real-time alert on attendance related event and auto scheduled reporting No correction required for overnight shift environment Products and Solutions Offered: COSEC PVR DOOR CONTROLLER - Palm Vein Door Controller COSEC CENTRA LE - Application Server Platform with 1000 Users COSEC LE TAM - Time Attendance Software Module COSEC LE ACM - Access Control Software Module
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorized and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorized to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorized fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilize the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorized entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
Boutique office company, Office Space in Town, has selected Opem Security to install SALTO Systems to provide access control for its newest serviced office development in London, Blackfriars. The company offers businesses and individuals flexible workspace solutions, providing serviced offices, co-working space, meeting rooms and virtual offices in London, Cardiff, Northampton, and Edinburgh. designed meeting rooms Affectionately named the ‘Happiness’ building, this vibrant and quirky, new serviced office development is located in Tudor Street in the heart of London’s prestigious Midtown district. The building has undergone an extensive £8.5 million refurbishment that has transformed it into affordable uniquely themed, high-spec luxury offices intended to help boost productivity and wellness in a professional, HQ quality standard office – created for those who appreciate style with a twist. The building now incorporates over 475 workstations split over five floors The building now incorporates over 475 workstations split over five floors, each with its own individual color treatment. The building also boasts nine individually designed meeting rooms – each based upon the theme of ‘what makes you happy’ ranging from a quirky hot air balloon designed room, through to an aquatic haven, deep down ‘under the sea’. Controlled air conditioning It is also the first building in the UK to feature Clear View Dynamic Glass - intelligent, electrochromic windows that automatically tint to maximize natural light and reduce heat and glare. The building also boasts the most-up to date technology, enabling it to achieve a Wired Score rating of Platinum, high standard soundproofing and individually controlled air conditioning, to support clients’ growth and business needs. Sara Chegwidden, Chief Operating Officer (COO) for Opem Security says “Right from the start of this project, the client wanted to incorporate the latest technology into the development. This meant that security for the building also had to be top notch, and that the access control system chosen had to be a technologically modern locking solution that would satisfy the needs of both the business and its users.” Integrated electronic locking SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution “It had to be wire free with no cabling requited for network points etc alongside the requirement to be able to grant access rights instantly and revoke them in real-time if and when required. An audit-trail overview of who accessed which door at which time together with easy installation completed the requirements. So, after a site survey and listening to how the customer wanted to operate and manage the building we recommended SALTO as the best product to fit the brief.” SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution that bring seamless access to every door in any building in an efficient, safe and secure accessible way. Building operating requirements It’s tailored to the customer’s needs and building operating requirements and designed to give users ultimate freedom of choice regarding system layout, type and number of access points as well as level of security. It enables users to incorporate the functionalities they need now, and upgrade accordingly as and when their needs grow. Security risks related to lost keys are completely eliminated and system operators can manage every door and user access plan from powerful web-based management software. Both staff and customers can open doors with convenient and flexible credentials; smart key card or by smart phone if required. There are no costs from lock replacement caused by lost keys, which saves valuable time and resources across the organization. Operating smart cards Controlling access plays an important role in the security of any building The new security system is now installed, with a total of 88 doors across a mix of communal doors, offices, meeting rooms and exit doors secured by XS4 original narrow body smart handle sets and SALTO wall readers. Controlling access plays an important role in the security of any building and SALTO’s Innovative, wire-free technology allows stand-alone electronic locks to read, receive and write information via their operating smart cards. And, if the client chooses, they can also incorporate the use of JustIN Mobile technology making it easy and secure to incorporate smart phones as a part of their access control solution. Access control solution Office Space in Town’s Developments Director, Simon Eastlake, comments, “From initial investigation through to building wide deployment, Opem Security have provided an excellent service. SALTO now provides us with a robust future proof access control solution that allows for the integration for third party systems as well as wireless doors and mobile tech as we wish.” Jason Pelham, Founder and Chief Executive Officer (CEO) for Opem Security concludes “The combination of the SALTO SPACE platform together with competent engineers and clarity of direction from such a professional client ensured this project was a pleasure to work on. The installation was straightforward and this ensured we delivered the project on time and fully met Office Space in Town’s security expectations.”


Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Products


White papers

3 Reasons To Migrate To A New Access Control System
Download
OSDP Is The Strongest Access Control For Your Business
Download
The Healthy Market For Video Surveillance At Medical Facilities
Download
Effective Access Control For Museums And Public Spaces
Download
Network Security Redefined: IP-Enabled Access Control
Download
Do You Know The Weakest Link Of Your Access Control System?
Download
Three Reasons To Upgrade Your Access Control Technology
Download
What Do I Need To Know To Successfully Deploy Mobile Access?
Download
Mobile Access - What You Need To Know
Download
The Evolution Of Cards And Credentials In Physical Access
Download
Security Risks of ‘Universal’ Card Readers
Download
Visitor Management: A Guide To Selecting And Employing A New Solution
Download
High-Security Electromechanical Locking Solutions For Critical Infrastructure
Download

Videos
Door security: Manufacturers & Suppliers
- Aiphone Door security
- Vanderbilt Door security
- HID Door security
- CyberLock Door security
- TESA Door security
- Bosch Door security
- Adams Rite Door security
- Magnetic Solutions Door security
- Alpro Door security
- Deedlock Door security
- Eff-Eff Door security
- Techniphone Door security
- Cisa Door security
- Trimec Door security
- Unican Door security
- CDV UK Door security
- ASSA ABLOY - Aperio® Door security
- AMAG Door security
- SALTO Door security
- Clarke Instruments Door security