Electronic security systems
Johnson Controls, the global renowned company in the field of smart and sustainable building solutions, released the findings of its annual Energy Efficiency Indicator survey, which found that more than half of organizations plan to increase investment in energy efficiency, renewable energy and smart building technology next year, comparable with investment trends after the 2010 recession. Of the factors determining investment, the majority (85 percent) said that reducing energy costs was a ver...
Evolution, the globally renowned company in integrated fire and security systems business, has announced the promotion of Mark Corrigan to the role of Director for business in Ireland. Irish business operations head Mark joined Evolution as a Service Engineer in 2013 and has continually impressed, quickly progressing to the position of Team Leader, before being promoted to Ireland Country Manager in 2015. He is now responsible for all Irish-based business operations and business development in...
Dahua Technology, the globally renowned video-centric smart IoT solutions and services provider, announced that the company successfully held the online Dahua Technology Partner Day 2020 event on December 1, 2020 with 26 technology partners. IoT and security solutions Dahua showcased its ecosystem in the EMEA region, while the partners brought solutions in the field of security and IoT, taking interoperability to the next level. Openness and cooperation is always Dahua's core values. To...
Buildings or sites with existing or future Nedap access control systems can now benefit from integration with Forge Bluepoint visitor management to give people visiting their space smart, secure and time-limited access. Integration with Forge Bluepoint The new integration was customer-driven by HB Reavis’s new building in Bratislava, Nivy Tower, which went live in November. Wayne Lee, Director at Forge, said “We’re excited about this partnership and being able to offer our c...
To say that the security industry draws people in and demonstrates its value in terms of relationship building with the caliber of people who comprise the industry is an understatement, as Bart Williams, President of Security Solutions and Communications, Inc. (Security Solutions) found out. Founder of Security Solutions Williams chose to become an engineer as his profession, but he began dabbling in the security industry part time, soon to discover it would lead him on the path to becoming St...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
Abloy UK has released a white paper to explore how the critical infrastructure sector can unlock the potential of smartphones in the workplace to improve employee mobility, job satisfaction and productivity. Despite consumer usage of smartphones increasing significantly over the last decade, many organizations haven’t been as quick to tap into the uses and benefits that smartphones can provide. Smartphones, an extension of IT infrastructure Abloy recognizes that smartphones should be an extension of IT infrastructure, and users can benefit from the device far greater than just a phone on a network. Integrating a device is more cost effective, functional and secure. The paper looks at how the cloud, integration, 5G and advances in battery life all mean that smartphones are now essential pieces of IT equipment, which should be used when they’re the most efficient tool for the job. Importance of mobile access in critical infrastructure The white paper also outlines the solution available to achieve this ‘keyvolution’, such as the CLIQ system It explores how critical infrastructure organizations can particularly benefit from this transition, as widespread roll out can deliver financial savings, environmental benefits and improve operational efficiencies. The white paper also outlines the solution available to achieve this ‘keyvolution’, such as the CLIQ system, PROTEC2 CLIQ technology and the new BEAT digital padlock. BEAT is a keyless solution that combines a digital key, a mobile app and a heavy-duty, Bluetooth padlock, ideal for critical infrastructure sites. Future of smartphones in access control systems Pip Courcoux, Sales and Product Manager at Abloy UK, said “We believe that smartphones will become a much more integral part of the next generation of access control systems. They are capable of so many functions that have become a central part of businesses network infrastructure.” Pip adds, “We have probably only realized a fraction of the value that smartphones can bring, and how they can provide the edge computing and connectivity necessary for true digital transformation. This will only be increased further by the introduction of 5G, offering faster connection speeds and a faster transfer of data.” Revolutionising remote access control He further stated, “Ultimately smartphones will revolutionize remote access control by bringing it into the digital era. The overall benefits of flexibility, time and financial savings, improved security and ease of use are too good to ignore. Their role in helping to effectively secure and manage sites allows critical infrastructure organizations to provide service continuity while building resilience.”
As International Security Week (ISWeek), 30 November – 3 December 2020, draws closer, experienced names in the industry are preparing to join together to dissect recent incidents of terrorism and how to combat extremism while protecting national assets. International Security Week The International Security Week marks five years since the shocking series of coordinated terrorist attacks across Paris, France which tragically killed 130 people. Recent incidents in Nice, France and Vienna, Austria have been a stark reminder that extremism and terrorism remains a key issue for nations, even during the ongoing COVID-19 pandemic. ISWeek will bring panels of counter terror experts together to look at how the industry can better share intelligence ISWeek, which incorporates International Security Expo (ISE), International Cyber Expo (ICE) and International Disaster Response Expo (IDR), will bring panels of counter terror experts together to look at how the industry can better share intelligence and best practice. Key insights on counter terrorism During Day One, sponsored by HS Security, attendees will hear from ex-jihadi Aimen Dean, who eventually defected to pass information to UK intelligence on Al-Qaeda’s networks and plots. He will explain how the Islamist movement is evolving in the wake of COVID-19. Steve Rodhouse, Director of General Operations will share perspectives from the National Crime Agency (NCA) on what will be the most pressing serious and organized crime to tackle in 2021. Balancing protection and access control Earlier this month, the UK’s alert level was raised to ‘severe’, and Niall Griffin, Hardstaff Barriers - Representing HS Security, a Division of Hill & Smith PLC, will explain why identification of risk and the implementation of measures must be managed carefully. Fay Tennet, Deputy Director of Security Operations at the Houses of Parliament will join a panel to deliberate the balance between protecting locations and ensuring it remains accessible for the general public. Steve Cooper OBE, Chief Operating Officer at Apstec Systems will speak to acclaimed security and intelligence journalist, Philip Ingram MBE about security screening in the post-pandemic era. Protecting Critical National Infrastructure (CNI) Mitigating the threats to Critical National Infrastructure requires careful policy and implementation Mitigating the threats to Critical National Infrastructure (CNI) requires careful policy and implementation. Justin Lowe, industry renowned expert in cyber resilience of energy and utilities and critical infrastructures and Senior Home Office Official, Shaun Hipgrave will take part in a panel discussion on Day Three, which focuses on Protecting Critical National Infrastructure & crowded places and adapting Law and Order, sponsored by Apstec Systems. Intelligence sharing in the Digital Age Intelligence sharing is made easier in the Digital Age, but Commissioner, Ian Dyson of the City of London Police will look at the impact of Brexit on the UK’s ability to share data with European and International colleagues and the solutions being put into place to continue effective transnational communication. Nineteen Events Ltd.’s Event Director, Rachael Shattock said “With 13 national infrastructure sectors in the UK, there is a tremendous amount for security professionals to consider when protecting a country’s way of life. That’s why we’re delighted to offer such a diverse range of voices at ISWeek in 2020, providing their experience in the fields of law and order, CNI protection and counter terrorism.” Rachael adds, “There are just days left to register to attend, so we encourage everyone in the industry to sign up today to access all of the fantastic content, as well as an exclusive report into the State of Security by Westlands Advisory.” Combined ISE, ICE and IDR events in one week Incorporating International Security Expo (ISE), International Cyber Expo (ICE) and International Disaster Response Expo (IDR), ISWeek will be filmed in a television studio setting, with high production value. Leading experts from around the globe will be interviewed by veteran security and intelligence journalist, Philip Ingram MBE, during high-level interactive panel discussions and ‘fireside chats’.
Acronis, a globally renowned company in cyber protection and data security solutions, has announced an update of its Acronis True Image 2021 that incorporates a professional-grade vulnerability assessment tool into the personal cyber protection solution. Scanning operating systems and applications Individuals and home office users can now scan their operating systems and applications for exploitable vulnerabilities and get recommendations on effectively closing those security gaps. Users can now scan their operating systems and applications for exploitable vulnerabilities With an estimated 60% of data breaches involving vulnerabilities for which a patch is available but not applied, and more than 11,000 common vulnerabilities and exploits (CVEs) listed for popularly used software, the ability to quickly find and fix those openings is critical in stopping cybercriminals. Vulnerability assessments Incorporating vulnerability assessments in the same personal solution as Acronis’ advanced anti-malware and backup ensures individuals, prosumers, and home office users can significantly reduce the risk of malware. “During the past five years, the emergence of ransomware as a service means criminals don’t need to be particularly technical and that they can just pay for a malicious toolkit that exploits unpatched vulnerabilities,” said Serguei Beloussov, Founder and Chief Executive Officer (CEO) of Acronis. Comprehensive cyber protection solution “Users need an easy and efficient way to identify and close those vulnerabilities to ensure their system data and backups are secure and protected. Providing that capability in one solution with anti-malware and backup delivers comprehensive cyber protection and tremendous value.” Given this year’s increased number of remote workers and online shoppers, cyber-criminals are expected to be particularly aggressive in their attacks, especially during the holiday shopping season. The ability to close any security gaps in their system comes just in time for users taking advantage of the Black Friday and Cyber Monday deals. VB100 certified anti-malware In addition to the vulnerability assessment tool, the autumn update also introduces an enhanced anti-ransomware engine. The improved engine further strengthens Acronis True Image’s next-gen, full-stack antimalware technology, which recently earned VB100 certification by returning a 99.9% detection rate with zero false-positives in the independent lab’s tests. Peter Karsai, Head of Testing at Virus Bulletin, said "We were pleased to welcome Acronis True Image to our endpoint security certification program and it came as little surprise that it achieved VB100 certification on its debut, the product's business counterpart Acronis Cyber Protect now having earned its third VB100 certification. We look forward to continuing to test both products." Enhanced ransomware engine The advanced anti-malware capabilities are included with Advanced and Premium licences The new vulnerability assessment tool and enhanced ransomware engine are both included in all editions of Acronis True Image 2021, the personal solution in the Acronis Cyber Protect family of products. The advanced anti-malware capabilities are included with Advanced and Premium licences, and offered as a three-month trial with Standard and Essential licenses. “Increasingly, cybercriminals are leveraging artificial intelligence and other technologies to make their malware more effective and increase the frequency of attacks. Stopping these attacks starts with fixing vulnerabilities so they are denied access to your system,” noted Candid Wüest, Vice President of Cyber Protection Research at Acronis. Anti-malware solution Candid adds, “Yet even with strong system defenses and an anti-malware solution, the reality is an attack can still get through. That’s why cyber security without backup and backup without cyber security, is ineffective against today’s threats. Only Acronis True Image delivers the cyber protection today’s users need.”
Mobile Communications America (MCA), the foremost provider of voice, video, and data solutions that enhance the safety, security, and operating efficiency of workplaces announces the addition of S3 Integration, LLC (S3), a front-runner in integrated security management systems, life safety systems, and IT solutions and services. Safety and security industry Headquartered in Baltimore, Maryland since 1996, S3 is a market front-runner in the safety and security industry with a geographic presence in Maryland, Virginia, Washington, D.C., and North Carolina. S3 provides a complete portfolio of professional services from planning, engineering, implementation, integration, to the maintenance of state-of-the-art security systems. Authority statements S3's President Tom Silcott described the acquisition as "S3 Integration is extremely excited to join MCA. There is a great amount of synergy between the two companies. Our knowledge and experience in the security integration industry will be a great addition to MCA." "We are excited for S3 to join the MCA family," said Vince Foody, CEO of MCA. "The security and life safety solutions and services S3 offers strengthens our portfolio and ability to provide customers the best options to fit their safety, security, and operational needs. Their commitment to customer service complements our service first DNA value." Expanding footprints S3 expands MCA's geographic footprint across Alabama, Arizona, Colorado, the District of Columbia, Florida, Georgia, Maryland, North Carolina, South Carolina, Tennessee, Texas, and Virginia.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software, and health monitoring software is designed to protect and monitor IP-based surveillance systems and complements the ComNet line of innovative network communication solutions. The Razberi appliance allows cameras, access control points, and other devices to add layers of protection while lowering the threat of cyber security risks to businesses. According to Tom Galvin, Razberi founder and Chief Product Officer, “We’re excited to join with ComNet and add more value to their deep network product line. ComNet can now offer a more comprehensive infrastructure for video transmission, storage, management, and cyber security.” Open video surveillance platform Bringing Razberi Technologies into the ComNet product portfolio made sense on many levels" Razberi’s open video surveillance platform includes intelligent appliances combined with automated cyber security and health monitoring software. In combination with a wide range of top third-party video management software (VMS) applications and IP cameras, enterprises can flexibly deploy a best of breed solution that reduces their total cost of ownership and reduces the likelihood of a costly cyber breach. “Bringing Razberi Technologies into the ComNet product portfolio made sense on many levels,” said Andrew Acquarulo Jr., ComNet’s Chief Executive Officer and President, adding “ComNet has strongly considered adding an enhanced surveillance product line that would make a significant impact on the market and bring a measurable improvement to any application. We believe Razberi is that product.” Enhancing cyber security and securing business networks ComNet believes the Razberi product line is a cost-effective solution and its cyber security products can complement ComNet’s emphasis on securing business networks. “With the intense focus on cyber security, the unique Razberi products directed to cyber threats, CameraDefense and ApplianceDefense now combined with ComNet Port Guardian, present a formidable defense against unauthorized network access,” said Skip Haight, ComNet Vice President of Marketing, adding “Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be.”
Boon Edam Inc., a globally renowned provider in security entrances and architectural revolving doors, has announced a new BoonTV event, ‘The Key to Closing the Biggest Gap in Physical Security: Unauthorised Entry’. BoonTV event - webinar In this event, JC Powell, Vice President of Sales at Boon Edam, reveals the assumptions and misconceptions around entrance security in physical security planning and how to effectively bring reliable entrance control to a facility to avoid costly risks and liabilities. Three inputs for controlling access to a facility The BoonTV episode begins by addressing the audience with two fundamental questions: Do homeowners know who is in their building at any given time? How many unauthorized people are acceptable in a facility? Importance of controlling access in premises These two questions set the stage for reinforcing the importance of controlling access These two questions set the stage for reinforcing the importance of controlling access and introducing three inputs for effectively monitoring who is in a building at all times: People, Process and Technology. JC Powell will then provide examples of how organizations must balance all three inputs, and explain how technology (the combination of access control systems, security entrances, biometrics, cameras, etc.) directly alleviates the pressure on both people and process. Scalable Security: three levels of entrance capabilities Next, the episode introduces the concept of ‘Scalable Security’, which helps the security professional select the right entrance type for each area of their building, based on the entrance's true capabilities related to tailgating mitigation - Deter, Detect, or Prevent. The true capability of an entrance will have a direct impact to the inputs of physical security, the People, Process and adjacent Technologies. Real-life case studies are shared that reveal the mistakes organizations have made before landing on the best entrance solution for their true needs. The future of the entry post COVID-19 The webinar concludes with a short discussion around the impacts of the current pandemic. JC Powell will share how he sees the future of the entry based on his discussions with industry consultants, integrators and end users, including discussions around touchless entry, thermal cameras and antimicrobial finishes and films.
In part one of this feature, we introduced the shotbolt – a solenoid actuator – as the workhorse at the heart of most straightforward electric locking systems. Shotbolts remain at the core of most sophisticated electric locking solutions as well. But they are supplemented by materials and technologies that provide characteristics suited to specialist security applications. Here we look at some more demanding electric locking applications and contemporary solutions. Preventing forced entry Where the end of the shotbolt is accessible, the electric holding force can be overcome by physical force. That’s why anti-jacking technology is now a frequent feature of contemporary electric solenoid lock actuators. Anti-jacking, dead-locking or ‘bloc’ technology (the latter patented by MSL) is inherent to the way the locking assembly is designed to suit the requirements of the end application. The patented bloc anti-jacking system is highly effective and incorporated into many MSL shotbolts deployed in electric locking applications. The bloc technology uses a ring of steel balls in a shaped internal housing to physically jam the actuated bolt in place. A range of marine locks is widely used on Superyachts for rapid lockdown security from the helm Real life applications for MSL anti-jacking and bloc-equipped shotbolts include installation in the back of supermarket trucks to secure the roller shutter. Once locked from the cab, or remotely using radio technology, these shutters cannot be forced open by anyone with ‘undesirable intentions’ armed with a jemmy. A range of marine locks is widely used on Superyachts for rapid lockdown security from the helm. While anti-jacking features are an option on these shotbolts, consideration was given to the construction materials to provide durability in saltwater environments. Marine locks use corrosion-proof stainless steel, which is also highly polished to be aesthetically pleasing to suit the prestigious nature of the vessel while hiding the innovative technology that prevents the lock being forced open by intruders who may board the craft. Rotary and proportional solenoids sound unlikely but are now common A less obvious example of integrated technology to prevent forced override is a floor lock. This lock assembly is mounted beneath the floor with round-top stainless-steel bolts that project upwards when actuated. They are designed to lock all-glass doors and are arguably the only discreet and attractive way to lock glass doors securely. In a prestigious installation at a historic entranceway in Edinburgh University, the floor locks are remotely controlled from an emergency button behind the reception desk. They act on twin sets of glass doors to quickly allow the doors to close and then lock them closed with another set of subfloor locks. No amount of stamping on or hitting the 15mm protruding bolt pin will cause it to yield, thus preventing intruders from entering. Or leaving! Explosion proofing In many environments, electric locking technology must be ATEX certified to mitigate any risk of explosion. For example, remote electric locking is used widely on oil and gas rigs for stringent access control, general security and for emergency shutter release in the event of fire. It’s also used across many industrial sectors where explosion risks exist, including flour milling, In many environments, electric locking technology must be ATEX certified to mitigate any risk of explosionpowder producers, paint manufacture, etc. This adds a new dimension to the actuator design, demanding not only intrinsically safe electrical circuits and solenoid coils, but the careful selection of metals and materials to eliminate the chance of sparks arising from moving parts. Resilience under pressure The technology boundaries of solenoids are always being pushed. Rotary and proportional solenoids sound unlikely but are now common. More recently, while not directly related to security in the traditional sense, proportional solenoid valves for accurately controlling the flow of hydrogen and gases now exist. Magnet Schultz has an extensive and somewhat innovative new range of hydrogen valves proving popular in the energy and automotive sectors (Fig. 2-6). There’s a different kind of security risk at play here when dealing with hydrogen under pressures of up to 1050 bar. Bio security Less an issue for the complexity of locking technology but more an imperative for the effectiveness of an electric lock is the frequent use of shotbolts in the bio research sector. Remote electric locking is commonplace in many bioreactor applications. Cultures being grown inside bioreactors can be undesirable agents, making 100% dependable locking of bioreactor lids essential to prevent untimely access or the unwanted escape of organisms. Again, that has proven to be topical in the current climate of recurring coronavirus outbreaks around the world. More than meets the eye In part one, I started by headlining that there’s more to electric lock actuation in all manner of security applications than meets the eye and pointed out that while electric locking is among the most ubiquitous examples of everyday security, the complexity often involved and the advanced technologies deployed typically go unnoticed.Integrating the simplest linear actuator into a complex system is rarely simple For end users, that’s a very good thing. But for electro-mechanical engineers designing a system, it can present a challenge. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available – from the straightforward to the specialized and sophisticated. Integrating the simplest linear actuator into a complex system is rarely simple. There’s no substitute for expertise and experience, and that’s what MSL offers as an outsource service to designers. One benefit afforded to those of us in the actuator industry with a very narrow but intense focus is not just understanding the advantages and limitations of solenoid technology, but the visibility of, and participation in, emerging developments in the science of electric locking. Knowing what’s achievable is invaluable in every project development phase.
The threat landscape we operate in today is changing all the time. Around the world, pressures on law enforcement bodies remain incredibly high as they face the challenge of rising international threat levels and a backdrop of intense political, social and economic uncertainty. It is a challenge that demands a considered, proactive and dynamic response. It’s clear that new technologies, such as Artificial Intelligence (AI), can dramatically improve the effectiveness of today’s physical and cyber security systems and help us to better defend against a wide-spectrum of threats. Finding the balance Specifically speaking, for physical security systems to be effective, they must have the full support of the public. Airport-style environments where security checkpoint processes are implemented are both time consuming and obstructive, and feels, at times, they are in no one’s best interest. Oppressive, fortress-like environments are likely to quickly lose the backing of the public, who want to be able to go about their daily lives without being delayed or obstructed by cumbersome security checkpoints and procedures. For physical security systems to be effective, they must have the full support of the public However, after a large-scale security threat or attack occurs, it is often these more overt systems that we gravitate towards, often fueled by a proven track record of both deterrence and detection. It’s the antithesis of ‘out of site, out of mind’ security. Having these large, bulky overt security systems offer reassurance to people and create a greater sense of security. But what if we could instill this sense of security without monstrous overt systems? What if today’s physical security systems could allow for seamless people flow while creating safe environments, all done in a covert manner without interrupting peoples’ way of life? This is exactly what can be achieved with the some of the new physical security applications that incorporate AI. Security solutions with AI: how, what, where? Today, security solutions driven by AI technologies are being developed and can be covertly deployed across a range of physical environments to protect our global citizenry. These new AI-driven technologies are taking multiple different forms, depending on the locations they are designed to protect. Video management surveillance systems (commonly referred to as VMS systems) are being enhanced by AI/computer vision technology to identify objects. These enhanced VMS systems can be deployed both inside and outside of buildings to identify and flag forbidden objects, such as visible guns, knives or aggressive people, in a wide range of public spaces, such as schools, hospitals, sport stadiums, event venues and transportation hubs. Recognized threat objects in hand or suspicious behaviours can be identified and flagged instantaneously for onsite security to further investigate. In addition, targeted magnetic and radar sensor technologies, concealed in everyday objects like planter boxes or inside walls, can now scan individuals and bags entering a building for concealed threat objects. Using AI/machine learning, these two sensor solutions combined can identify metal content on body and bag and match the item to a catalog of threat items, such as guns, rifles, knives and bombs with metal shrapnel. Without this advanced multi-sensor solution, it becomes nearly impossible to discover a weapon on a person's body before it appears in an assailant’s hands. This multi-sensor solution allows for a touchless, unobtrusive access to a building, but allows for immediate notification to onsite security when a concealed threat is detected. The hidden technology thus empowers security staff to intercept threats before they evolve into a wider scale attack, while also maintaining the privacy and civil liberties of the public, unless, of course, they are carrying a concealed weapon or pose a physical threat. AI-powered solutions proactively help onsite security to effectively safeguard the public Unlike many large, fixed detection security systems, AI-powered solutions proactively help onsite security to effectively safeguard the public without causing mass obstruction and disruption. Soft target hardening Hardening a facility against physical attacks and threats can be expensive, as well as maintaining and running large fixed detection equipment. It may also result in the threat shifting to ‘softer’, less secure targets, for example schools, music venues and places of worship, all locations we’ve see active attacks in the past decade. Around the world, we have seen the devastation to communities and the aftermath impact of these attacks. In the USA, for example, in February 2018, a 19-year-old gunman walked into Marjory Stoneman Douglas High School in Florida, and opened fire, killing 17 students and faculty members. And in the UK in May 2017, a suicide bomber attacked a concert venue in Manchester, tragically killed 22 people. It is a global priority to make these soft target public gathering places more secure. But in doing so we cannot turn them into fortresses. The security industry, public sector and national and local government must collaborate to deploy intelligent systems with technology at their core to not only protect lives, but also preserve a way of life. Integrated systems and behavioral detection One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. It’s not only knives, guns and explosives that intelligent systems can detect. They can also be trained to detect behavior and potential invisible biological threats, such as viral threats currently facing our world today. This does not mean profiling individuals. Instead, using AI that is deployed on existing CCTV or thermal camera systems, it looks for indicators that may identify a physical altercation and disturbance, an elevated body temperature, indicative of viral fever, or lack of a face mask for health safety compliance. When integrated, these solutions can provide onsite security with up-to-the-minute information to allow greater protection of the properties they serve. By using these intelligent, non-intrusive technologies, today’s security personnel are now more capable of detecting a wide range of threats. This is the future of public safety and security, and we should expect to see these new technologies becoming more common over the coming years, as cities around the world strive to create smart, safer communities. The human element While technology can make a significant impact to existing security systems, it would be wrong to position it as the end-all, be all to preventing future attacks. Technology is only part of the solution. Well trained security personnel are also required; individuals who know how to use new technologies and the data they provide, and then make informed decisions about how to engage a potential bad actor or threat. Not only will a properly trained security staff member help to prevent an attack from happening, but the extra insight provides by these intelligent systems can potentially interrupt an attacker in planning and walk through stages, or even before a weapon is drawn. This alone has many benefits beyond just preventing an attack. It means that authorities can help these individuals, some of whom may be suffering from mental health issues, to get the help they need from professional healthcare workers. By security personnel working with local authorities and healthcare professionals, potential attackers can get the support they need, from de-radicalisation programmes to specialized counseling, helping them return to being a healthy, productive member of society. These intelligent systems can potentially interrupt an attacker in planning AI for safer communities AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Perhaps none more so, though, than to institutes of education, where we have seen many violent attacks over the course of the last few years. Specifically, the application of AI for detecting odd behavioral activity could be used to identify potential active shooter attacks, or even students who may be depressed and prone to committing suicide. Both tragedies we see weekly around the world. One thing is clear, cross-sector collaboration and the application of integrated, intelligent AI technology that puts data and ultimate control into a human’s hands can be key to making our communities safer places to live.
Electric locking is among the most ubiquitous examples of everyday security. Yet the complexity of electric locks and the advanced technologies deployed to provide simple, dependable and, for the most part, impenetrable locking often goes unnoticed. And that’s a good thing: when we take things for granted, it usually proves they’re fit for purpose. As experts in the field of solenoid actuated designs, we’re okay knowing that remote electric locking solutions are taken for granted and that the design sophistication behind a functional and reliable locking assembly is often overlooked. As readers of this journal will know, security takes many forms. Perhaps the most recognizable application of a security policy is the ability to lock something. A door to prevent access. A gate to control the flow of people or vehicles. Or shutters to guard against theft. Or to unlock a turnstile to allow ingress and egress, as found in leisure centers and museums. Or to switch between either flow direction when required – think soccer match stand access, for instance. In part one of this feature, we look at straightforward electric locking solutions that use solenoid actuators. Straightforward security measures However, while locking can be one of the simplest security initiatives, it’s also capable of being among the most complex where sophisticated measures are called for. In part two, we will cover specialized electric locking technologies and some more unusual security solutions and application examples. Among straightforward security measures is remote locking Among straightforward security measures is remote locking – a function found almost everywhere you look. Unless you’re the proud owner of a classic car, when did you last physically put your vehicle key in the door lock? Remote locking ups the ante for designers who need to incorporate security in an assembly, an application, a product or a system. Solenoid Workhorses Solenoid actuators and electromagnet technologies are the bedrock of electric locks. Remote operation – activating a lock from a distance – is commonplace. Wireless RF transmitters in the key fobs of modern vehicles activate the central locking system. Cards with embedded RFID chips, fingerprint readers and facial recognition systems provide selective access to buildings, typically by either actuating a solenoid lock or releasing a powerful door magnet. You can see examples on the Jubilee and the new Elizabeth (Crossrail) lines on the London Underground. They use electric solenoid-based locks to secure platform access screen doors, only allowing them to open once the underground train has arrived. Solenoid-based electric locking is at the heart of safety-based security in applications such as elevator doors and disabled access lifts, on building hoists, and as interlocking systems for screens and safety covers on machine tools, to name a few. Solenoid-based electric locking is at the heart of safety-based security These are straightforward applications that address a range of issues that come under the general heading of security. Others demand special features built into the electric locking mechanism to meet specific end user requirements. This added complexity can present a design challenge to the inexperienced. Electro-mechanical design engineers invariably have a useful broad knowledge for developing products but not necessarily a core expertise in solenoid technology. One example we like to use is a railway carriage. To design and build that takes a huge breadth of knowledge and expertise due to the many systems and assemblies a carriage comprises. But passenger trains now feature remote electric door locking which must function perfectly – and without which the rolling stock is unfit for purpose. That electric locking subassembly design is a critical feature and a specialist development project. Solenoid actuators and electromagnet technologies are the bedrock of electric locks Shotbolts A generic term used for electric solenoid locks is shotbolts. In these linear actuating units, the solenoid typically moves the bolt directly or through a bell crank to turn the actuation through 90 degrees, or to extend the linear movement of the bolt. They can be built as Fail-safe or Fail-secure models, meaning energise-to-lock, or energise-to-release respectively, which determines the state they adopt in the absence of power. You would want some applications to default to unlock in the event of power loss, and others to default to the locked state. Both types usually deploy a spring to return the bolt in the quiescent unenergised state. Bi-stable is another functionality available. In this design, no power is consumed in either position. A loss of power will leave the device in its last state. Scaling down Some shotbolts are large. Those designed to secure the access ramp on the Solent hovercraft built by Griffon Hoverwork are powerful units – and in that application a weatherproof design is deployed to withstand the saltwater spray and frequent washdowns. But a shotbolt and the solenoid contained within it can be physically quite small and require minimal power, yet still provide highly secure locking in a mortice lock arrangement. This is where the locking assembly starts to become complex Over the years, bespoke designs have been developed for diplomatic bags and Cash In Transit (CIT) cases. Both use small, low power actuators. In the latter application by specialist Cash In Transit equipment manufacturers HDH, intelligent electric lock technology provides unique features – and there’s a range of surprises in store for anyone accessing cash boxes illicitly. Technologies in cash transit solutions include GPS tracking, alarms, remote monitoring and automatic ‘cash degradation’ systems if a case is forced open. Ensuring that degradation systems don’t activate when a case is opened legitimately is equally important. This is where the locking assembly starts to become complex, requiring special design expertise. The CIT solenoid lock uses a 90°actuator to latch, lock and arm automatically if required but can be set to not lock or arm as the actuator travel doesn’t engage with the mechanical latch mechanism by default. Integrated technology solutions inside the case include daylight sensors, surface protection wires inside and out, and reed switches between the lid and the base. All contribute to safety precautions that prevent accidental activation and protect the valuable cargo and the operator. But for first line security, straightforward shotbolt electric locking is still at the heart of CIT cases. Internet of Things Miniature shotbolts are also used in some medical ventilators – a topical subject at the time of writing during the global coronavirus pandemic. They are also increasingly appearing in consumer-level Internet of Things (IoT) applications, being a key component in home automation applications. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available. We dealt with some straightforward technologies and applications here. In part two, we will look at special technologies built into more sophisticated solenoid locks to prevent forced entry, at materials that guard against explosion risks in hazardous environments and even at the use of proportional solenoid technology to manage pressurized gases. Read part two of this feature here.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power. Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centers are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
In a time where marking specific locations have never been more important to aid in carrying out safe social distancing, security teams can struggle to communicate locations that do not have physical addresses. Need to effectively track locations Traditional street addresses can only work to a certain extent, globally 70% of addresses will not take one to the front door, with 74% of people saying clients, services and deliveries struggle to find them. Many places don’t have an address at all, so teams are left to depend on landmark-based descriptions such as, for example an address mentioning behind the third building to the left of the large tree, just after the crossroads. GPS coordinates can help, but they are difficult to communicate over the radio. what3words location tracking app what3words is a free app which has divided the world into 57 trillion 3-meter squares and given each square a unique combination of three words, a what3words address. The what3words app enables people to easily convey locations from specific building entrances or parking spots, and it provides easy location references in places with no street addresses, such as building sites, event spaces and large offices with multiple entrances. Location and property management company, The Movie Lot, use what3words to manage their security operations. The Movie Lot specialize in film and television security, location support, and traffic management for the British entertainment industry. Cutting-edge GPS technology We’ve used what3words to coordinate guards on locations from Hospital sites to outdoor film sets" They are experts at using cutting-edge GPS technology to ensure that even the most complex operations are equipped to cover the smallest detail. The Movie Lot use what3words to coordinate production and security crews as well as equipment while on location, and have also provided security staff for University College Hospital London during the Covid-19 pandemic, as well as working on some of the world’s renowned household name entertainment productions, such as the Fantastic Beasts and Doctor Who movie franchises. The Director at The Move Lot, Mark Davies, explains how what3words has helped their security. He said, “We are proud to be partnered with what3words, it has been a huge addition for us to navigate guards to their exact position on locations. We’ve used what3words to coordinate guards on locations from Hospital sites to outdoor film sets.” An effective and quick emergency response Mark adds, “what3words is commonly used in the film industry and being able to utilize it on site to describe precise locations has given our team great support.” what3words has also been credited for its capability of saving lives, with emergency services urging the public to download the app in order to facilitate a more efficient response. what3words works offline, making it ideal for use in rural areas or areas with an unreliable data connection.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”
Hicking Building RTM Company Ltd has teamed up with Videx Security and Joes UK Limited to solve a major door entry issue for a large residential complex. The Hicking Building Ltd. is a Nottingham-based development comprising 329 self-contained flats, managed by property agents Walton and Allen. Many residents were struggling with a call issue because the existing intercom system developed a fault which meant residents weren’t receiving calls from the system panels. Because of this, tenants were missing visitors and deliveries with people thinking they weren’t home. Videx GSM 4812 intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system that would also work in conjunction with the existing access control system, where the fob entry element of this was working normally. Joe, who owns and manages Joes UK Ltd., said “The system installed is a very old system and we were struggling to source the repair parts needed to fix the calling issue tenants were experiencing. To fix the problem and reduce the risk of the issue happening again, I recommended the installation of a digital audio GSM 4812 intercom system by Videx that could work concurrently with the fob entry function of the existing solution.” He adds, “With the Videx GSM 4812, when someone calls a specific apartment the call is automatically directed to a registered phone number of the tenant’s, which is usually their smartphone. They now will never miss that important visitor or delivery and are made aware of who has visited even when they are not there and can authorize entry if they wish, while away from their home.” Parallel operations with software-based fob entry solution The Videx system works alongside the existing software-based fob entry solution that residents have used for many years. Mobile phones are now the handset of choice for the majority of people and as they are enabled with Wi-Fi calling, there’s no need to worry about poor mobile signal. If the existing fob system also developed a fault and stopped working, the Videx GSM system includes a preinstalled fob reader so it would be easy to switch this over to the GSM solution. Mark Gibbon, Sales Manager at Videx Security, said “The GSM system is the ultimate entry system of convenience that also provides maximum security too. There’s no infrastructure or wiring involved; it’s very easy to set up and use.” The GSM system is the ultimate entry system of convenience that also provides maximum security Mark adds, “It’s a win-win situation for both the resident and management company because it means residents won’t have to stay home waiting for a delivery, or miss a visitor, as they can answer the call to their apartment from anywhere in the world. For management companies, our GSM solution offers a fixed cost and minimizes the risk of call outs because there’s no handset maintenance involved.” Remote event log with online access A really useful feature of the GSM system is that it also carries a new remote event log that can be accessed online, allowing events to be viewed in real time, on the move via a phone, tablet/laptop. It’s a great security feature because it’s where a record is kept of calls, gate/door openings and much more. What’s also useful is that alerts can be programmed where an email will be sent should that alert be triggered. For example, if the gate or door is opened out of normal hours or if the registered number for a flat or property is changed too frequently - any unusual activity is flagged.
Redlands Unified School District, located in San Bernardino Country, California, hosts more than 21,000 students across its 16 elementary schools, four middle schools and four high schools. School security is paramount for the district. It’s taken extra precautions, including a focus on lockdown procedures across its locations and the district office. K-12 school security can be challenging, especially with the uniqueness of Redlands High School. It’s an older facility that was constructed more than 100 years ago. Additionally, students must walk outside to pass from building to building, and there’s a street that cuts through campus. A crosswalk is needed to get from one end to the other. The district needed to take all of this into account when assessing their security plan. Securing every layer The district’s security team took into consideration each physical layer that needed protection The district’s security team took into consideration each physical layer that needed protection at Redlands High School, from the district level to the classroom and many openings in between. Yet, there was a common area that needed addressed. There’s a fence around the campus to protect the property perimeter. And Redlands High School is extending that fence to include the cross walk, which will help funnel guests into a single point of entry, the main office. Schlage AD Series electronic locks This opening, as well as many other perimeter openings that lead into offices, gyms, auditoriums, libraries and hallways in the school feature Schlage AD Series electronic locks that are connected to the district’s access control system. At the classroom layer, each door has mechanical hardware that can be locked from the inside. Redlands School District has started district-wide implementation of a full-feature enterprise access control system through Vanderbilt, which is capable of operating across different schools, campuses and other locations. RedRock Security and Cabling, Inc. (RedRock Technologies) had implemented and continue to support the solution. Electronic access control “When these systems are managed district-wide, schools have the ability to lock down a door at a time, a school at a time or an entire district at a time,” said Jennifer Martin, Director of System Sales at Vanderbilt, adding “It’s all about protecting the students.” With electronic access control on main points of entry and many assembly areas, plus secure mechanical locks on classroom doors, Redlands High School had most of the layers prepared in the event of a lockdown event. However, the school’s cafeteria, Terrier Hall, was a vulnerable space. “Hundreds of students use Terrier Hall,” said James Fotia, Director of Maintenance, Operations and Transportation at Redlands Unified School District, adding “In a lockdown situation, that’s a place where we would secure the kids and keep them safe by clustering them into that area and having it locked down. But it was secured by one AD-400 lock on a pair of double doors. That was incomplete.” Von Duprin RU retrofit option Allegion representatives recommended a new K-12 security solution from Von Duprin To demonstrate how the school could affordably secure big banks of doors without having a reader on each opening, Allegion representatives recommended a new K-12 security solution from Von Duprin. The Von Duprin RU retrofit option is a cost-effective solution for openings with existing exit devices that enables remote locking, or un-dogging, for centralized lock down. This enables staff to initiate an immediate campus-wide lockdown from a secured location instead of putting themselves in harm’s way to manually undog exit-device doors throughout the building. Integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signals are included to provide real-time remote monitoring and confirmation of the security status of the door. Wireless connectivity to ENGAGE Gateway There’s also a ‘dog on next exit’ feature, which is a scheduled function sent to the device to allow the door to remain unlocked the first time someone depresses the push pad of the exit device to leave that space. The door is secured in the evening, and with ‘dog on next exit’ enabled at a specific time in the morning, staff simply depresses the push pad to unlock the door. This makes unlocking the door simple for scheduled events and daily lock-up easy by reducing the need to distribute keys to staff. Additionally, the RU option connects wirelessly via Bluetooth Low Energy to Allegion’s ENGAGE Gateway which provides real-time, bi-directional communication to the access control software. RU is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A Series devices. Enhanced door security “The Von Duprin RU option fits into special applications that haven’t been addressed in the past,” said Russell Gamble, End User Consultant at Allegion, adding “There are several openings that will benefit from this secure lockdown solution.” At Redlands High School, the Von Duprin solution is installed on five doors that surround the cafeteria area. There are main entry doors where students enter, plug in their lunch numbers and go through the buffet line. From there, they enter the multi-purpose space, where there are four additional doors, which are secured with the RU options. Access control solution with lockdown capabilities There was also interest in implementing the security solution at the district office There was also interest in implementing the security solution at the district office. The school wanted to pilot the solution there to experience the product and its features, especially the lockdown capabilities. And being that the building is so unique, it has a need for enhanced security. “The district office is a converted warehouse, so it was never really meant for meetings and offices,” said Fotia, adding “Having the Von Duprin RU has been a wonderful fit in providing security in a not so ideal building.” Integration with Vanderbilt solution The main building is built U-shaped and the loading dock is in the middle. In the middle there is a courtyard area with four portable offices. The Von Duprin RU is on each portable door. At both locations, the Von Duprin RU options are integrated into the Vanderbilt solution and part of the broader lockdown solution. “The greatest thing about this solution is schools now have a way to electronically add control to doors that used to be manually monitored,” said Jennifer Martin. Remote lockdown and door access control She adds, “With the Von Duprin 99 Series, doors allow for free egress, but they aren’t usually monitored by access-controlled systems. If someone has it dogged so the doors are unlocked or propped open, someone has to manually go around and lock each door.” This solution ensures staff is alerted if a door is propped open and enables the ability to lock down the door remotely, even if it was previously mechanically unlocked. Enhanced lockdown capabilities for peace of mind Redlands Unified School District is pleased with the addition of the Von Duprin RU Redlands Unified School District is pleased with the addition of the Von Duprin RU to its school security plan. Integrating the solution with the Vanderbilt system, along with the Schlage electronic locks on campus has improved lockdown. According to the district’s Coordinator of Operations and Facility Planning, Ken Morse, it’s also improved peace of mind because there are less errors and more control over these areas. In the cafeteria, Terrier Hall, they’re able to secure doors that used to be manually controlled. This eliminates human error and the risk of manually locking doors in an emergency. Fotia said the school also likes the budget-savings aspect since it was able to simply upgrade the hardware it already had in place versus purchasing entirely new equipment. He’s excited to see other areas where the Von Duprin RU might be a fit. “The security measures and the lockdown capabilities are the main reasons we wanted the Von Duprin product,” said Morse, adding “Putting something on a schedule is also a great bonus because of how many common-use facilities we have. We’ve found that scheduling it is relatively easy. The doors are open only when they need to be. We have everything scheduled at the district office so it’s open during our hours, which has been a huge benefit.”
Round table discussion
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- ACT Electronic security systems
- Alpro Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- HID Electronic security systems
- Morse Watchmans Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- AMAG Electronic security systems
- Dahua Technology Electronic security systems
- Corbin Russwin Electronic security systems
- Baxall Electronic security systems
- EVVA Electronic security systems