Electronic security systems
Research carried out by a renowned Cyber Security company, Intruder has revealed that on average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database was set up. MongoDB database program MongoDB is a cross-platform document-oriented database program that consistently ranks in the top 5 most-used databases worldwide. It is used by a wide range of organizations all over the globe to sto...
Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an...
Suprema, a global provider of access control, time & attendance and biometric solutions, recognized the trend towards contactless, biometric and cellphone credentialing long before the onset of the COVID-19 pandemic. The company's premier biometrics solution, FaceStation 2 Smart Face Recognition Terminal, employs intelligent facial recognition ensuring highly accurate personal identification and authentication for improved overall security with contactless operation. MobileAccess, Suprema's...
The Radio Equipment Directive which is applicable for most wireless equipment also in the fire and security industry looks to be prepared for an update where cybersecurity requirements will become part of the directive and with that part of the CE-marking. While Euralarm supports the need for increased cybersecurity, the fire and security industry will preferably support a horizontal cybersecurity regulation. Nevertheless, if embedded in the RED, Euralarm wants to ensure that the technical aspe...
SALTO Systems has announced the release of its SALTO contactless smart card NCoders. The SALTO NCoder is for next-generation access control systems and they integrate the encoding capabilities of a powerful updated encoder with a built-in desktop reader function. SALTO NCoder The SALTO NCoder configures permissions and user access plans for user credentials. It is compatible with a wide range of RFID cards and mobile keys and can be used in most commercial markets including hospitality, enabli...
SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has released the SALTO Neo Cylinder, a new electronic cylinder that offers more features and better functionality than any other cylinder on the market. The compact SALTO Neo Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors and more. It’s available in...
Telaeris, a handheld badge verification and emergency mustering solutions provider for physical access control systems (PACS), has announced its XPressEntry software integration with Maxxess eFusion access control software. XPressEntry - eFusion integration Maxxess access control customers can now use a variety of XPressEntry compatible handheld badge readers to quickly muster employees during an emergency evacuation, verify identity, perform medical screenings at entry points, record entries and exits where door readers are not practical, and much more. “We welcome Maxxess and their powerful eFusion software to the family of XPressEntry access control integrations,” said Dr. David Carta, Chief Executive Officer, Telaeris. He adds, “Securing commercial and government facilities are important work, especially in these new COVID-19 times. The added functionality and flexibility plus Coronavirus screening that XPressEntry bring is helpful for safety and security professionals around the world.” Remote reader solution for secure verification Nancy Islas, Maxxess Systems President, said, “We are excited to offer our customers a robust remote reader solution for day to day secure verification of access control as well as advanced mustering applications for managing emergency situations.” The Telaeris integration enhances the Maxxess emergency management and coordination system" She adds, “The Telaeris integration enhances the Maxxess emergency management and coordination system and allows our customers to easily verify personnel anywhere in their building or on campus.” XPressEntry badge verification solution XPressEntry’s badge verification solution with commercial grade handheld badge readers is now able to be connected to the Maxxess eFusion system. XPressEntry maintains updated facility occupancy information and can quickly verify personnel and visitor badge information including name, photo ID, and permissions against the Maxxess eFusion database from anywhere with cellular and Wi-Fi connectivity. Emergency evacuation and employee mustering solution It also delivers an emergency evacuation and employee mustering solution, verifying that personnel and visitors are accounted for and safely evacuated during emergency situations. In addition, XPressEntry now supports validating personnel and visitor health status information before entering work areas to support COVID19 workplace safety protocols. XPressEntry is globally renowned for handheld badge verification with integrations to most access control systems now, including Maxxess eFusion. XPressEntry handhelds proudly read more badge technologies than any other handheld in the industry including iClass, Prox, Indala, DESFire, Mifare, and PIV and can simultaneously poll for both HF and LF credentials. XPressEntry has also been penetration tested and certified as secure using appropriate security protocols and encryption.
In the pursuit to develop the smartest locking technology for the growing parcel locker market, Camlock Systems engineered and manufactured a sophisticated, second generation version of their popular S100 rotary latch design. In response to customer demand, the new and improved three-wire electronic latch delivers all of the high-security, tamper resistant benefits of the original two-wire version but with additional high-performing lock and door monitoring functions. The Series 100 is now packed with more innovative features that control and monitor access, and enable customizable door actuation for the whole terminal, or specific sections of it. Thanks to the design of the lock and its PCB, all of which were developed in-house, pull or spring-assisted door opening and alarms are standard features. Development of locking systems As innovation is at the heart of all of the company’s product developments, they went one step further to give their customers ultimate flexibility and control over their locking systems. In addition to the lock upgrade, they have created a simple, magnetically-operated monitoring module. When using the optional monitoring module, a host of programmable controls can be utilised When using the optional monitoring module, a host of programmable controls can be utilized, including: Child safety features for low-to-floor lockers, auto-relock, and soft, secure door closure for sealed cabinet doors. By understanding their customers’ needs and keeping pace with their technological advances, the company is able to channel their 100+ years of experience into the development of locking systems that offer the ultimate protection and control of their assets. Smart locking systems Developing the Series 100 to offer highly customizable functionality, in addition to housing their motorized, tamper and shock-resistant mechanism is just one of the ways they have responded to the technological needs of their customers. Camlock Systems Product Manager, Steve Martin comments: “With the rise in self-service locker banks, kiosks and vending machines, we’ve designed the Series 100 to respond to needs of the self-service market because today’s world needs more than just security - our customers require smart locking systems that offer flexible monitoring and control functions that can be moulded around the environment and users of their machines.” Maintaining low power Designed for self-service terminals in public and remote areas, the latch offers a unique solution to concealed, electronic latching. By doubling the number of jaws compared to a typical latch, the two symmetrical jaws built-in corrosion-resistant steel not only reinforce the latch’s strength but also provide more convenient mounting options. The company’s intelligent mechanism delivers the ultimate power-efficiency by maintaining low power After rigorous in-house testing and independent review, the S100 is tamper-resistant, certified to withstand over 7000N of force and 300N of preload - ideal for preventing lockers falsely opening as a result of being over-filled with heavy parcels or luggage. In addition to being strong, the company’s intelligent mechanism delivers the ultimate power-efficiency by maintaining low power and recalibrating only when needed, instead of after every cycle. Fit for versatile installation With 60% less power usage than other rotary latches. With Camlock Systems solutions, the users can be sure of an accurate fit every time and the innovative design of the S100 is no different, offering a flush, concealed fit for versatile installation. Product features: Cycle tested to over 100,000 cycles Tested to withstand over 7000N of force and 500N pre-load IP65 rated (dust and water spray resistant) Designed to work in hot climates, humidity, and below freezing with operating temperatures; -40°C to +65°C Available as a simple latch or compatible with an existing intelligent system International patent applied for. The Series 100 is only available directly from Camlock Systems Glass-reinforced, flame-resistant plastic housing. Stainless steel and brass latching parts for superior strength Tamper and shock-resistant mechanism will not fail under vibration or percussive shock Fitted with a mechanical override for protection in the event of a power failure. Lock status monitoring for added security Compatible with an additional switch module for configurable door monitoring, security, and control features Stepped down mains, battery-powered or both. Energy-efficient, low operating current. System recalibrates itself only when required Flexible integration and consistent, flush installation thanks to built-in vertical panel movement
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered access to computers’, according to the software’s creators. Eyal Itkin, a Vulnerability Researcher at Check Point, demonstrated that a threat actor with access to a computer inside an organization can execute a Reverse RDP attack, an attack in which a remote PC infected with certain malware takes over a client that tries to connect to it. Reverse RDP attack Once in control of the gateway, an attacker could eavesdrop on all incoming sessions In this case, the Reverse RDP attack would enable a threat actor to take control of the Apache Guacamole gateway that handles all of the remote sessions in a network. Once in control of the gateway, an attacker could eavesdrop on all incoming sessions, record all the login credentials used, and even control other sessions within the organization. Check Point researchers say this foothold is equivalent to gaining full control over the entire organizational network. Check Point researchers classified their findings into two attack vectors: Reverse Attack Scenario: A compromized machine inside the corporate network leverages the incoming benign connection to attack the Apache gateway, aiming to take it over. Malicious Worker Scenario: A rogue employee uses a computer inside the network to leverage his hold on both ends of the connection and take control of the gateway. Data security in remote work operations Omri Herscovici, Vulnerability Research Team Leader at Check Point said, “While the global transition to remote work is a necessity, we cannot neglect the security implications of such remote connections, especially as we enter the post-coronavirus era. This research demonstrates how a quick change in the social landscape directly affects what attackers might focus their efforts on. In this case, it’s remote work.” Omri adds, “The fact that more and more companies have externalised many internally-used services to the outside world opens a number of new potential attack vectors for threat actors. I strongly urge companies and organizations to keep their servers up-to-date to protect their remote workforces.” Check Point Research responsibly disclosed its findings to The Apache Software Foundation (Apache), the maintainers of Guacamole, on March 31, 2020. On May 12, Apache issued 2 CVE-IDs to the 4 reported vulnerabilities, and Apache has released a patched version in June 2020.
Allied Universal, a renowned security and facility services company in North America, announces the availability of distance screening solutions as companies continue to launch their ‘return to workplace' initiatives. Distance screening solutions Allied Universal Technology Services experts are working with customers to design and implement the screening solutions that best fit their company's environment, requirements and existing security operations. The screening solutions include state-of-the-art technology that connects artificial intelligence and human response to better protect people with accurate, real-time data and safer social interaction. The comprehensive suite of distance screening solutions includes: Fixed and Semi-Permanent Thermal Screening Solutions - American-made handheld, fixed and semi-permanent or fully automatic systems that use thermal imaging and data analytics as effective pre-screening solutions. These imagers and smart scan stations help prevent the spread of COVID-19 by detecting elevated body temperature. Robotic Solutions - Robotic distance screening solutions that combine the intelligence and reliability of robots with the personal problem-solving capabilities of humans. The interactive robots perform access control, communications and screening functions with key functionalities that support COVID-19 protocols and social distancing guidelines. Kiosk Screening Solutions - Thermal checkpoint kiosks solutions provide unmatched screening accuracy. The camera and system were designed, calibrated, and lab-tested to address the critical elements that skew temperature readings when deploying a thermal camera in environments typically affected by heat variances from open doors, drafts, heat and A/C ducts. Handheld Thermal Screening Solutions - Handheld imagers are calibrated to target the highest temperate reading on a person's face. Employee safety and risk management "With new and evolving COVID-19 guidelines, organizations in every industry are trying to determine how best to minimize risks and move forward," said Jim Geyer, Vice President of Sales for Allied Universal Technology Services at Allied Universal. Jim adds, "With the right protocols, trained security personnel and technology solutions, organizations will be able to reduce their health risks at their facilities and continue to move their businesses forward."
SecurityHQ, formerly known as Si Consult, the globally renowned provider in managed security services, has announced the launch of their new brand identity with a redesign of their company logo and official website, as part of their rebranding strategy. Managed Security Service Provider Over recent years, SecurityHQ has evolved into one of the most renowned and advanced Managed Security Service Provider (MSSP) in the world, with six Security Operation Centers spread across the United Kingdom, the Middle East, Americas, India, and Australia. The company has received global recognition for SecurityHQ, and became finalists for the IBM Beacon Awards for their security features. Known by their clients, partners, employees, and audience for their services as SecurityHQ, the company has, therefore, made the decision and taken significant steps to represent who they are as a company, by adopting SecurityHQ as their new brand name. Security Intelligence Redefined As part of the rebranding strategy, SecurityHQ also revealed its motto - Security Intelligence Redefined" Feras Tappuni, the Chief Executive Officer (CEO) at SecurityHQ said, "As part of the rebranding strategy, SecurityHQ also revealed its motto - Security Intelligence Redefined. We are delighted with the re-brand, the new logo and website design. These changes represent who we are as an organization, and our position in the managed security service industry.” He adds, "It is important to note that our company values have not altered. We continue to pride ourselves on our transparency, integrity, and availability. There has been no change in staff ownership or shares.” Seamless service provider Feras further stated, “Our services will continue to run seamlessly. All existing contracts, NDA's, and legal elements with partners and clients will remain the same. The only difference is what few people know us for as Si, now many will know us for as SecurityHQ."
ELATEC, a globally renowned manufacturer of innovative multi-frequency RFID readers, will have a new CEO as of July 1, 2020. Robert Helgerth takes over the management of the company and will set the course for the company's growth in the future. In Robert Helgerth, who was most recently responsible for Microsoft's partner business in Asia, ELATEC has gained a visionary manager with great expertize in the strategies, structures and processes of internationally successful corporate management. Enhancing corporate profile The previous CEO, Stefan Haertel, is moving from operational responsibility to a strategic consulting role for product development and acquisitions. Robert Helgerth, who holds a degree in business administration, has written success stories as a managing director of corporations, medium-sized companies and start-ups. A visionary and pragmatist at the same time, Robert Helgerth brings with him an extensive worldwide network through his many years of work in the USA and most recently in China. IT security sector veteran There is hardly any other industry in which you have to be more open to progress and innovation" "There is hardly any other industry in which you have to be more open to progress and innovation. This is why I appreciate the ‘doing’ mentality of medium-sized companies like Elatec: addressing issues, drawing up a joint plan, implementing it decisively and then celebrating success together with our customers," said Robert Helgerth, the new Chief Executive Officer (CEO) of ELATEC GmbH. Robert Helgerth looks back on a successful career in the IT industry, with positions in the management of Microsoft, Compaq Computer GmbH (part of Hewlett Packard (HP) Enterprise), Digital Equipment GmbH and other large IT companies. The starting point of his career was Nixdorf Computer AG. Former Elatec CEO to continue in advisory role The former CEO of ELATEC, Stefan Haertel will remain as a member of the Advisory Board and as the Senior Advisor for Strategy, he will continue to advise the management board on strategic issues. His focus will be on product development, new markets and mergers & acquisitions. "We are very pleased to have found a competent manager in Robert Helgerth, who - with his expertize in the areas of vision, strategy, structure and processes - will steer our company with a sure hand through the new challenges of a changed future," said Stefan Haertel, who will support his successor from his new position with his knowledge and passion for ELATEC.
There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. The first thing you should ask is “does my firm have a certified thermographer?”. If not, the firm are at risk of getting a low quality system that is being resold to make quick cash. Businesses that are doing this do not know how to operate it properly. Asking the right questions Secondly, you should ask whether the system is NDAA compliant. NDAA compliance means that your temperature detection equipment is protected by U.S. law. Does your system have a HSRP device (blackbody)? HSRP (Heat Source Reference Point) is a device that will allow the camera to detect the correct temperature a distance. Even if the room temperature does change throughout the day, treat it as a reference point for the camera to know the temperature at that distance. Can your system scan mutliple people at once? Can your system scan mutliple people at once? This is a bad question but often asked since most systems will say yes. For ease, everyone wants to scan many people at once, but the best practice according to FDA and CDC guidelines is to run one person at a time for best accuracy. Why? The HSRP (blackbody) device tells the camera what the correct temperature is at a given distance away from the camera. Every foot you are away from the HSRP device will be off by 0.1 degrees roughly. If you are in a room full of people, let's say 6, in view of the camera, every person that is not next to the HSRP device (5) will be given an inaccurate reading. Hence why it is so important to run the system correctly with just one person at a time. You will also need to follow the 6 feet rule. If you take that into consideration, one at a time at 6 feet apart, the device should tell you how you need to run the system. Sensitivity of thermal imaging Is your system’s sensor accurate enough? The FDA recommends an error of ±0.5°C or better. When looking for a system, make sure it is better than what they recommend. I would recommend ±0.3°C or better. Do not purchase a system over ±-.5°C degrees as you are doing yourself and your customers or employees an injustice. Another thing to look at is how many pixels it can determine the temperature from. Some cameras can only tell the temperature of 6 points on the screen, whilst others can take a temperature reading from each pixel. Take a 384x288 camera, for example, which would be over 110,000 points of temperature taking on a single image. Thermal cameras are very sensitive, so there are a lot of do’s and don’ts. For example, the system cannot see through glasses or hats. On the below image you can see a person with the visual camera on the right, whilst on the left side is through a thermal camera. Both are pointing at the same area. It is clear the person on the left side is “invisible” to the thermal imaging camera. Demonstrating the sensitivity of thermal imaging If you are a company who wants to detect the temperature of customers or employees though the front door, window or a car window, the answer would be no. You need a clear line of sight without any interference to scan for temperatures. Other things you need to look out for is wind and distance away from the HSRP (blackbody) device. Air and distance away from the HSRP device will make the system less and less accurate the more space between the device. Air and distance away from the HSRP device will make the system less and less accurate Thermal imaging and COVID-19 If you have a clear line of sight, is there anything I need to know? The answer is yes. Reflective materials such as metal can interfere with your temperature readings. Reflective materials are easily picked up from the thermal side so pointing at a medal, glass or anything reflective can cause inaccuracies within the system. In the age of COVID-19, temperature detection systems are more important than ever. Organizations must get a system in place to help scan for high temperatures in order to reduce the spread of the virus.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
With the start of the 2020s, many security industry experts are reflecting on the emerging technologies over the past decade and looking forward to what is in store in the future. Artificial Intelligence (AI) is a buzzword that has infiltrated everyday nomenclature throughout the past decade. Every industry from healthcare, to banking, to security has implemented some form of AI that is touted as the hidden key to maximizing productivity and/or security. However, AI technology is still in its infancy and is not the panacea that many cybersecurity experts claim. Why AI is more hype than reality AI is a nascent technology and has limited practical applications Today, AI is a nascent technology and has limited practical applications because it’s still difficult to understand the rational that is used by the machine learning algorithms for making their decisions. As a result of this limited understanding, these technologies are only leveraged for pinpointed functionality. For example, AI can be designed to analyze data for specific threats, such as malware, but AI technology is only as good as the data it analyzes and cannot be fully trusted to discover new threats that emerge on their own. Furthermore, even when a threat is detected by AI, humans are still needed to confirm that a real risk is present. The value of AI in security today AI undoubtedly has its place in today’s security space. Government agencies and the military use AI to comb through hundreds of hours of call data to try to isolate terrorist or criminal activity. In its current state, AI can successfully review large amounts of data and automate repetitive tasks. The results of these services are helpful as additional data points, but at this time it makes more sense to use AI as helper technology rather than fully relying on AI to ultimately make decisions for organizations. Furthermore, AI can be utilized in access management to watch the habits of individuals and identify actions that stray outside the norm. For example, if a user logs into a system outside the normal working hours, AI can identify this anomaly and utilize step-up authentication to further validate the user should be granted access. AI can also be leveraged for access certification campaigns by providing scoring that helps approvers prioritize their efforts on certifications with low scores. However, algorithms should not be trusted to make higher stake decisions. This is because AI cannot currently be taught or programmed with the intuition that humans naturally possess, making the risk of a breach or other security threat is considerably higher. As computing power rapidly grows, so will the future of AI capabilities AI will continue to grow from its infancy into a more useful and robust tool In this next decade, AI will continue to grow from its infancy into a more useful and robust tool that companies can utilize to keep their assets and people safe. There will be a point where AI reaches a mature stage where it can truly think and learn on its own; computing power has grown exponentially in the last decade and will only continue to grow more in the next. This increase in computing power opens up a limitless number of possibilities for AI usage, especially as humans perfect and refine AI’s algorithms. For now, AI has a place in today’s security industry and has already proven to be adept at identifying threats and making society safer. While this is helpful, humans remain as a critical factor in evaluating threats. I believe that the future of AI is bright, and fully expect that our capabilities around explainable AI will rapidly advance thus providing many opportunities to leverage these technologies in a fully autonomous capacity in the not-to-distant future.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
Using computed tomography (CT) security technology for cabin baggage screening at airports can eliminate the need for passengers to remove liquids and laptops from their bags, thus helping to make the security process easier and more efficient. As the latest in checkpoint scanning technology, CT provides 3D images with much more information to improve threat detection capabilities so decisions by the operator can be resolved quickly and more accurately, without the need for manual search. The whole experience is better and safer for everyone. The use of computed tomography The Netherlands were the first to introduce CT at the checkpoint and the Transportation Security Administration (TSA) in the United States plans to install 145 units in its airports by the end of the year. Australia is already installing and using CT at some of its airports. The United Kingdom is the first country to mandate use of CT for screening cabin baggage, and it is expected that the EU will also mandate this type of technology in the near future. It is expected that the EU will also mandate this type of technology in the near future The process of deploying CT is another level in the evolution of passenger screening and aviation security. Since 9/11, the traveling public has become increasingly educated about aviation security, says Steve Revell, Senior Director of Aviation CT at Rapiscan Systems. “What passengers expect is courtesy, professionalism and, most of all, to be able to travel safely without fear of harm,” he says. “Each level of security we have seen introduced over the years, I believe, shows commitment from all stakeholders to meet these key deliverables.” Rapiscan Systems' 920CT Rapiscan Systems' 3D cabin baggage screening system, 920CT, utilizes patented Dual-Energy technology and a sophisticated algorithm to provide the highest level of automatic detection of highly dense items, as well as automatic detection of explosives based on the most stringent global regulatory requirement. It also has a truck wheel design and contactless power and data transfer, both of which reduce maintenance costs and downtime and make the 920CT more efficient and robust. Rapiscan's 920CT provides the highest level of automatic detection Rapiscan’s 920CT is equipped with advanced software and detection algorithms that are designed to be upgradeable. With 3D volumetric imaging, the 920CT is superior to 2D systems as it provides improved visualization of potential threats. It has also been engineered to integrate seamlessly with Rapiscan’s TRS tray return solution to create a more efficient checkpoint experience, for both passengers and staff. “As a manufacturer, we strive to provide the very best quality service and equipment we can – working closely with regulators and airports alike to ensure the evolution and expansion of air travel is both collectively understood and fit for purpose,” says Revell. Portfolios and partnerships Rapiscan has a wide portfolio of products and capabilities. However, one company cannot do it all. “For this reason, we will always look to best-of-breed technologies that complement our offerings and provide a cohesive solution and, more importantly, long-term partnership,” says Revell. “The partnership deliverable is what drives the future. Our mission is one of an open platform that invites other technologies to work in conjunction with ours and integrate in such a way that can provide meaningful reports and controls systems to our clients, driving core efficiencies and security enhancements.” Our mission is one of an open platform that invites other technologies to work in conjunction with ours “The efforts borne by each of the key stakeholders is done for one very important and aligned reason, to ensure to the very best of our abilities that passenger safety is put first, is always put first and is done in the most courteous, professional way possible, without any undue inconvenience,” he adds. Increasingly, airports are asking for suppliers’ systems to talk to each other. Many airports have security screening equipment from multiple manufacturers and want to put images from these into a single, searchable database, to track missing items, improve productivity and efficiency, or comply with regulations. The Digital Imaging and Communication for Security (DICOS) is an industry standard that defines an interoperable data format for integration of security screening technologies across multiple vendor platforms. It facilitates the development and use of improved security screening technologies and third-party software. Rapiscan’s 920CT supports DICOS, and the company is working with multiple vendors to help create a single platform for airports.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
Amthal has worked closely with the management team and residents at Kenilworth Court to ensure fire and security upgrades on site occur without compromising on aesthetics of the Edwardian mansion blocks. Situated in Putney, Kenilworth Court consists of eight purpose-built Edwardian style blocks of flats, completed in 1904 – 1905. Featuring 150 portered flats, with a garden in the middle, it is now run by the controlling company, Kenilworth Court Co-ownership Housing Association Ltd. Upgrading door entry system The opportunity to upgrade door entry from audio to video capability saw the initial introduction of Amthal to the development. So successful in understanding the importance of keeping with original design features, working closely with the management team and residents, from initial specification through installation and project completion, Amthal now additionally maintains security gates and all fire requirements on site. Video security system at Kenilworth Court Steve Logie, General Manager at Kenilworth Court Co-Ownership Housing Association Ltd, said “With the historic significance of our development, and the pride of notable residents who have lived here, any upgrades, however small, must be carefully considered with regards to how it will impact on the aesthetics of the overall premises.” Steve adds, “Amthal understood this and worked closely with us and our residents, carefully taking in feedback to create bespoke video door entry solutions that blend with the grand entrances. Installation was sympathetic, always ensuring wiring was discreet and ‘boxed in’ where necessary.” He further said, “So impressed with their customer service and technical ability, we now consider them our preferred supplier for all fire and security maintenance.” CAME BPT brass entrance panel installed Based on resident feedback, Amthal created and installed a bespoke CAME BPT brass entrance panel for Kenilworth Court Based on resident feedback, Amthal created and installed a bespoke CAME BPT brass entrance panel for Kenilworth Court, allowing all homeowners to benefit from stylish video door entry technology. Residents and staff also benefit from an upgraded Paxton Net2 access control system, with dedicated fobs distributed to ensure safe and secure block entry. Phil Bryant, Amthal Strategic Accounts Team Manager added, “The key to our success with Kenilworth Court was taking the time initially to create an installation works program with video door entry systems that could blend in visually without disrupting the architectural aesthetic of the development.” Enhanced security system Phil adds, “We spoke with the management team and residents throughout the design process, bringing door entry styles and samples to ensure everyone was confident in the installed final solution.” He further said, “From this, our engineering team and customer service has built up a trusting relationship where residents understand our needs to operate internally, sometimes within apartments themselves and also through communal areas. And the management team has peace of mind that fire and security requirements will be maintained to exceed standards across the development.” Security solutions expert Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
When Broome County, in the US State of New York, took the decision to upgrade its public safety radio network, it required the highest quality video surveillance system to safeguard its US$ 23 million investment in critical infrastructure. New radio network Working with Integrated Systems, a solution combining networked Axis cameras, illuminators and radar motion detectors, with Qognify’s Ocularis video management system (VMS) was installed, to deter, detect and respond to unauthorized activity, at each of its nine new radio towers. The new radio network replaces a system that was in place since the 1970’s and improves communications for police, fire, along with other emergency services and public works departments for the municipalities across the county. 24/7 security monitoring Each of the radio tower sites required a combination of networked PTZ and fixed cameras" Such mission critical infrastructure requires reliable round-the-clock security monitoring, so Integrated Systems was approached, for its reputation in the delivery of technology solutions to government and industry, to specify and install a new video surveillance system. President of Integrated Systems, Mark Hamilton, explains, “Each of the radio tower sites required a combination of networked PTZ and fixed cameras, as well as radar motion detection to provide comprehensive coverage that would ensure any unauthorized activity would be swiftly detected, automatically recorded and alerts triggered, to initiate a timely and appropriate response.” Axis camera and radar detection technology Axis camera and radar detection technology was chosen for interior and exterior use at each radio tower site and the award-winning Ocularis to provide the all-important integration. Hamilton adds, “Early in our engagement with Broome County we urged them to migrate from their disparate video surveillance architecture, whereby VMS, NVR and DVR systems were all being managed individually across the county.” He further said, “Our recommended solution was a single unified, IP-based system that was county-wide sanctioned. To achieve this, we specified the Ocularis VMS from Qognify.” Ocularis video management system Ocluaris is a VMS that is ideal for large-scale projects such as Broome County, with an emphasis on tactical real-time operations and live visualization, it is supported by full system redundancy and 24/7 availability. Integrated Systems were impressed by Ocluaris’s rich feature set, intuitive user interface (including visually mapping of the entire camera estate) and impressive scalability. What’s more with Axis as a Qognify Technology Partner it instilled the confidence Broome County needed to switch to a more unified approach to video surveillance. PTZ and fixed cameras installed All surveillance camera footage is recorded and centrally archived at the County Data Center Using Ocularis, authorized personnel at the Central Security Building and Emergency Management Services Center have 24/7, 365-days access to live and archived footage from every camera at each of the nine sites. The PTZ cameras installed give a 360-degree view of each radio tower site, while fixed cameras monitor the tower yards main gates and shelter doors. Meanwhile, the radar motion detection system guards the perimeter. All surveillance camera footage is recorded and centrally archived at the County Data Center via the county’s microwave data network. “If any suspicious activity is detected an operator can rapidly view, review and replay all relevant footage through Ocularis,” explains Hamilton. Use of video analytics and visual maps To aid the speed of response, the operator also benefits from the use of visual maps to rapidly determine what cameras are available across each site, as well as video analytics to minimize time required to trawl through footage to identify activities of interest. Broome County has been impressed with the Axis and Qognify solution, which has also been integrated with its existing county-wide video network that includes street cameras, buildings and mobile video command systems. The success of the project has been recognized with a prestigious Security Solutions Award. Hamilton concludes by saying, “Qognify’s Ocularis is now the lead VMS that Integrated Systems specifies whenever embarking on a new video surveillance project.”
In 2014, when Siete24 began working with the bank, it was operating 800 branches, 27 offices and 3200 ATMs, all requiring round-the-clock protection. Their security infrastructure included more than 90,000 sensors, 15,000 surveillance cameras, 3,000 DVRs and 1,500 access points. To manage this expansive enterprise the bank was operating five independent systems, using legacy software and was heavily reliant on the knowledge of its operators. Julio highlights the scale of the challenge: “In 2014 the bank was receiving two-million alerts per month, which was far more than it could effectively handle.” With the bank planning major expansion, they needed a solution that would not only deliver immediate benefits but have the ability to scale significantly. The solution that met this need was the enterprise incident management system - Qognify Situator from Qognify. Reduction in false alarms The fact that Situator was already tried, tested and proven in the banking sector was an important consideration in selecting the system. Having been in use by Millennium BCP in Portugal since 2011, Situator was able to reduce false alarms from more than 20,000 to 1,200 per annum. Since Siete24 began its work with the bank six years ago, the scope of the project has grown. The number of sites being monitored has doubled and the volume of sensors has increased by 50%. “Today, Situator is handling up to 18 million alerts per month, of which 71,200 are verified and 109 confirmed as incident, each managed using best practice procedures we have defined in the system,” explains Julio. “Despite this dramatic increase in the size of the project, our average response time to critical events has fallen from five minutes in 2016 to just 50-seconds in 2020. We have found that the more alerts we process the more efficient and effective we become.” Qognify Situator has created a positive impact on operational performance, that the bank has recently extended its contract with Siete24 for a further three-years. Julio concludes: “The bank requires that we have 99.9% availability, and we are financially accountable for any losses. Situator has enabled us to not only meet our service level obligations, but has given the bank far more than it anticipated.”
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage. The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with oneself. Filtering access intelligently and dynamically has become part of security’s job description. Yet there is no need to dispose of the key altogether. One can adapt it, rather than throw it out. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys, familiar and user-friendly… but evolved. When the key has a brain, one can do more with less. These efficiencies are critical in a world where demands on the public institutions are at levels not seen in generations. Cut workload and solve the problem of lost keys One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys" Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive rekeying and reissuing to relevant keyholders are complex and expensive. Programmable keys, however, solve the problem quickly. The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too, at great expense. Key duplication costs were mounting. “One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre. To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system. Now lost or stolen electronic keys are cancelled instantly using secure cloud software which works inside a standard browser, no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filtre access to specific sites and doors according to the precise requirements of every municipal employee. Keep residents safe in their homes In Aalborg, Denmark, around 3,000 citizens in home care have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents. Certified technicians simply replaced each old cylinder with a programmable cylinder If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement — keeping the keyholder’s home safe and saving the city time and money on rekeying. Managing Aalborg’s system is straightforward. Lock installation was quick and easy: certified technicians simply replaced each old cylinder with a programmable cylinder — with no wiring and no major alterations to the door. Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grant or revoke access, and tailor permissions for different users or locations according to defined needs. In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets.More rapid response means a better chance to prevent a fire spreading Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire. When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key. More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, Skellefteå residents at home and firefighters at work. Clear workflow bottlenecks in public housing With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant. However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay. Security managers issue the precise permissions which every staff member needs At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process. Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs. The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys, and the time and money spent coordinating this process, has been eliminated. Preserve the fabric of historic buildings, and the design integrity of new spaces Building type can make a big difference to the access control one chooses. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control. Here, wireless electronic cylinders which simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. Intelligent key security is hardly noticeable for the library’s many visitors The issue of aesthetics also affects modern public spaces, albeit differently. In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium four storeys high, and public entrances on all four sides. Almost as soon as it opened, the building was declared an architectural icon — “instantly one of the world’s most beautiful libraries.” Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage Save time and money managing keys for a mobile workforce Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights. With a Bluetooth-powered solution, everyone carries their own programmable key Mobile workers use more fuel and increase a carbon footprint. One makes a business more sustainable quickly if one reduces the mileage one travels. Reducing miles while maintaining security is not easy, if one relies on mechanical keys to secure remote or dispersed sites. Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key. With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app — meaning fewer miles driven and less money wasted on unnecessary fuel. One technology powers all the solutions All the installations referenced above — and many, many more across the full spectrum of public services — run on the same technology: CLIQ® from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks. CLIQ locks are installed without wires: every cylinder’s power is supplied by a battery inside the CLIQ key. These keys are physically identical and programmable by a system administrator using a desktop updater; by keyholders with a portable programmer; or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff. Intuitive software makes it simple to manage access rights, enable and disable keys and customise access schedules, on site or on the go. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
There are a handful of amazing things that set San Francisco apart from other global cities. Notably, there is the Golden Gate Bridge, Alcatraz Island, Fisherman’s Wharf and Chinatown, the Twin Peaks overlooking the city skyline, San Francisco Bay, and The Moscone Center. Just how does a convention center fit into the list of places to see in beautiful San Francisco? It is the largest convention and exhibition complex in San Francisco, California. It includes three main halls spread out across three blocks and 87 acres in the prime South of Market neighborhood. The convention center originally opened in 1981 and has gone through several renovations. It is currently upgrading its security system to reflect a modern, state-of-the-art security solution. Securing SMG/Moscone Center Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport. However, clients who use the facility are required to provide their own inside security. When the doors of the convention Center are open to the public, it plays host to people who want to come in and look around. Our new security system will provide analytics, and the ability to look at the images in real time" “We are responsible for facility security inside and on the perimeter outside. This is considered a soft target, so we do everything possible to harden the security,” said Damion Ellis, Director of Security at the SMG/Moscone Center. Damion adds, “The time is right for us to take out the old security system, including the old analog camera system. Our new security system will provide analytics, and the ability to look at the images in real time.” IP cameras installed for wide surveillance Like any major metropolitan area, the San Francisco metropolitan region has its own issues that have to be dealt with that aren’t pleasant. This includes keeping track of the homeless population and what they are doing. Damion Ellis further said, “We are able to place the new IP cameras in places where the homeless population congregates on the outside, in dark corners of the facility.” CompleteView VMS video platform The Moscone Center complex consists of three main halls. Moscone South is located to the south of Howard Street and is three-story tall. It opened in 2017, replacing the original Moscone Center building that opened in 1981. A Keith Haring sculpture stands outside the hall at the corner of 5th and Howard streets. Moscone North is located to the north of Howard Street, and Moscone West is a three-level exhibition hall located across 4th Street from Moscone North. Integration with ProWatch access control platform “One of the most compelling reasons Moscone deployed CompleteView video platform was the integration with Honeywell’s ProWatch access control platform, as well as newly designed multi-sensor cameras,” said Salient’s Regional Sales Manager in the Bay Area, Cindy Doyle. Cindy adds, “The ease of use and intuitive software allowed the guard staff to use maps in the system to identify where triggered events took place for guard dispatch.” Monitoring door alarms Prowatch access control platform is currently being used to monitor door alarms throughout the property Prowatch access control platform is currently being used to monitor door alarms throughout the property and triggering video call-up and/or alarm video event when there is a forced or held open door. In order to keep track of outside foot traffic and provide interior and exterior security, an analytics option was foremost on everyone’s mind, and integrator Microbiz Security Co., dove in with an initial site survey to determine the best course of action. Microbiz has partnered with the SMG/Moscone Center for several years. Video analytics solution “Our goal was to take a look at what it would take to secure the facility, but to do it properly,” said Todd Chritton, President of Microbiz Security. “The integrator had some suggestions in terms of offering better security coverage in some areas,” said Marco Escobar, Vice President of Operations at Microbiz Security, adding “What they knew was three buildings needed to update from its current 2002 technology, and upgrade to 2018 technology. It also was beneficial to the integrator having worked on site for several years and also having worked with Ellis during his tenure with the Hilton Hotel chain.” Multi-sensor and multi-megapixel IP cameras Marco Escober further stated, “We’ve been a long-time vendor at the convention center, and we offer a pride of installation as well as using the best of the best security solutions. We began by updating current cameras to Arecont Vision multi-sensor and multi-megapixel IP cameras and Salient Systems’ CompleteView VMS, Dellintegrated server with RAID6 configuration and CompleteView Enterprise software." He adds, "The VMS is a fully open architecture, enabling convention center security staff to seamlessly leverage existing technology investments and minimize disruption.”
The Office for Students (OfS) is the independent regulator of higher education in England, responsible for ensuring that all undergraduate and postgraduate students, whatever their backgrounds, have a fulfilling experience of higher education which enriches their lives and careers and delivers value for money. They are headquartered in Bristol, United Kingdom with a workforce of around 450 people. GDPR Data Privacy Management Higher Education Funding Council for England (HEFCE), Office for Students’ predecessor, became a client of SureCloud back in 2017, implementing the GDPR Data Privacy Management Suite to support and enhance their GDPR program. As a new organization and a successor of HEFCE, Office for Students has been looking to mature its approach to risk management. The focus of this for the team was initially to improve risk policies and procedures, to develop internal capability, enhance reporting to show transparency and allow challenge, and to identify and manage risks enterprise-wide systematically. Effective Risk Management approach Office for Students needed a single, seamless, enterprise-wide solution to manage all aspects of risk management These improvements established a highly effective risk management approach, but the organization soon hit the ceiling in terms of their process supporting risk systems, with technology being a limiting factor rather than an enabler. The organization was relying on numerous disparate spreadsheets to assess and monitor different types of risk, these were inconsistent, time-consuming and error-prone. Office for Students needed a single, seamless, enterprise-wide solution to manage and monitor all aspects of risk management. Data privacy Risk Management solution Office for Students has been a SureCloud client for cybersecurity services since March 2017 and began deploying SureCloud’s governance, risk and compliance (GRC) solution in July 2017 to assist with their responsibilities under GDPR. Knowing that SureCloud also offered a comprehensive risk management solution (recognized on Gartner’s IRM Magic Quadrant), which could be tailored to their precise needs, Office for Students opened a conversation with SureCloud about how best to configure their existing SureCloud Data Privacy Risk Management solution to enable enterprise risk management. SureCloud’s Risk Management solution delivers: A central view of risk across the organization via a single intuitive dashboard Risks organized across divisions, legal entities, business functions, and geographies The ability to provide a central repository for enterprise risk, allow the organization to show the entirety of the risk environment and consider overlaps and interdependences A range of risk management methodologies to understand the likelihood, impact and overall risk rating Configurable drillable dashboards and reports to provide a real-time snapshot of risk at any time Centralized, cloud-based platform SureCloud’s centralized, cloud-based platform underpins the Risk Management product SureCloud’s centralized, cloud-based platform underpins the Risk Management product, allowing anyone from across an organization deploying the application to add information at any time, from anywhere. Office for Students worked with SureCloud to configure the Risk Management application to their precise needs and was ready for rollout ahead of schedule. Rapid implementation services “SureCloud got to grips with our requirements incredibly quickly,” said Ben Whitestone, Head of Governance at the Office for Students, adding “As the only independent regulator for higher education in England, we regulate in the interests of hundreds of thousands of students, and we take that responsibility very seriously.” Ben adds, “Managing the risks we face is an important part of our governance. But with our legacy systems, we were focused more on updating spreadsheets than actually managing risk. SureCloud’s platform is enabling us to take a far more agile approach to risk management, focusing on taking action to mitigate threats and exploit opportunities, with substantial time and cost savings as a result.” Streamlined, centralized Risk Management “SureCloud’s Platform has moved us away from using a series of disparate spreadsheets and countless emails for recording risk, with all of the potentials for errors that entails, to a single, centralized source of risk information for every member of staff,” said Whitestone. He further adds, “It’s dynamic and agile, if we want to get a snapshot of risk for a particular department or function, we can.” Intuitive, user-friendly platform We are very pleased with how quickly staff can get to grips with the SureCloud Platform" “Despite us being at the start of our risk management journey, we are very pleased with how quickly staff can get to grips with the SureCloud Platform, this was a key factor for us” commented Whitestone. Whitestone adds, “They can more or less log on and go – it’s extremely intuitive and easy-to-use. In turn, this means that it frees up a huge amount of time spent manually inputting or transferring information, which is a great advantage for us.” Systems and culture working in-sync “We undertook a great deal of work to evolve our culture of risk management, to one that was far more consistent and proactive.” stated Whitestone He adds, “With SureCloud’s Risk Management solution in place, we have the systems to underpin that culture, and enable us to take a far more streamlined, agile and accurate approach to help manage risk across the organization.”
Round table discussion
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- Alpro Electronic security systems
- Morse Watchmans Electronic security systems
- SALTO Electronic security systems
- ACT Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- TDSi Electronic security systems
- AMAG Electronic security systems
- Dahua Technology Electronic security systems
- Corbin Russwin Electronic security systems
- Baxall Electronic security systems
- EVVA Electronic security systems
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload