The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Allied Universal®, a security and facility services company in North America, recently hires Morgan Price as senior vice president of recruitment and talent acquisition to lead the company’s recruiting efforts. He is based in the Santa Ana corporate office. With more than 20 years of talent development and human resources experience, Price is an expert in workforce planning, performance management, succession planning and leadership development in the global supply chain management in...
Kit (PEK), combines the unerring accuracy of lasers to scan the environment in much the same way a radar does, but at a much higher resolution, building an image of the world around it regardless of lighting conditions. Presenting the technology in the UK for the first time at IFSEC International in London’s ExCeL, Cepton’s VP Neil Huntingdon says that because the device combines the sensor with a powerful micro-computer in a single package it can process the information directly at...
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with...
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can...
VuWall, the provider of video wall and AV network management, and TBC Consoles — a world-class technical furniture designer, manufacturer, and installer— announced a partnership to provide customers with an affordable and efficient control room kit that addresses the specific requirements of small to midsize control rooms — and fully complements VuWall solutions. Engineered to simplify the design, quoting and purchasing, and installation process for small and medium size contr...
Larson Electronics, a Texas-based company with over 40 years of experience spearheading the industrial lighting and equipment sectors, announced the release of an explosion proof digital pan tilt zoom security camera for remote observation in both indoor and outdoor hazardous locations. This day/night camera is high resolution and features a mechanical infrared cut filter and motion detection with up to 64GB of internal storage. The EXPCMR-PT-IP-POE-DPTZ explosion proof digital pan tilt zoom security camera is rated for use in Class I, Divisions 1 and 2, Groups B, C and D; Class I, Zones 1 and 2, Groups IIB+H2 and IIA; Class II, Divisions 1 and 2, Groups E, F and G; and Class III, Divisions 1 and 2 hazardous locations. This unit is made of durable copper-free aluminum and operates on 12V DC while consuming a maximum of 12W per system. This unit also features two 3/4" 14 NPT drilled and tapped conduit openings, one on the top and one on the bottom, for wiring. Equipped with 1.27 mm optical lens The explosion proof security camera is equipped with a 1.27 mm optical lens and produces up to 6.0 megapixel resolutionLarson Electronics’ explosion proof security camera is equipped with a 1.27 mm optical lens and produces up to 6.0 megapixel (3072 x 2048) resolution. Operators can choose from a 150-degree fisheye, 180-degree horizontal panoramic or ePTZ quad view. The camera features two-way audio using a built-in speaker and microphone and is IP66 rated waterproof. This camera can operate in harsh environments with temperatures ranging from -22 degrees F to 140 degrees F and 0% to 95% non-condensing, humid environments. This camera has Power over Ethernet (PoE) enabling data transfers and power to be passed through a single Ethernet cable and features a pole top mount with an attached slip fit yolk for easy installation. Suitable applications for this camera include remote observation of external facilities, indoor and outdoor security, commercial buildings, and more.
3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European market earlier this year, 3xLOGIC will exhibit its diverse range of cutting-edge products as well as demonstrate their integration capabilities. Leading the way is the integration of 3xLOGIC’s NVRs and standalone cameras into PACOM’s GMS and Unison product lines. VIGIL Enterprise Grade VMS 3xLOGIC’s VIGIL enterprise grade VMS is the driving force behind the VIGIL range of NVRs, DVRs and PoE cameras3xLOGIC’s VIGIL enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NVRs), digital video recorders (DVRs) and Power over Ethernet (PoE) cameras. To further enhance VIGIL’s suitability for multi-site environments, it has been integrated with the PACOM Graphical Management System (GMS). Engineered to communicate over an IP network, the PACOM GMS allows for full integration of access control, alarm monitoring, video surveillance and many other security functions. 3xLOGIC’s Visix Facial Recognition camera is making its European debut at IFSEC 2019. This special purpose, low cost, dual lens 2MP device is designed for instant face detection, and the identification and notification of persons of interest. Using camera-based analytics and 3xLOGIC’s exclusive facial recognition software and mobile app, users can review images and choose which individuals to place on a watch list. Unison Security Management Furthermore, 3xLOGIC’s Facial Recognition camera has recently been integrated into PACOM’s Unison security management platform. An open security solution designed specifically for campus-based organizations, Unison is the solution of choice for organizations within vertical sectors such as healthcare, universities, commercial buildings, public facilities, municipalities, airports, shipping ports and data centers. The combination of Facial Recognition capabilities with Unison improves operational efficiency by quickly and accurately identifying persons of interest, and streamlining processes to use this information to meet the organization’s security and marketing goals. TRENDS empowers the user to interpret vast amounts of disparate data more effectively and efficiently than ever before For those looking to optimize organizational efficiency, 3xLOGIC’s TRENDS cloud-based business intelligence tool incorporates exception-based reporting, video data and third-party applications into an easy to use dashboard that provides a simple visual snapshot of business operations. TRENDS empowers the user to interpret vast amounts of disparate data more effectively and efficiently than ever before, offering unrivalled levels of visibility to quickly spot issues and liabilities that can seriously impact a company’s bottom line. Bluetooth-Based Card Reader Last, but certainly not least, visitors will have the chance to get hands on with the new PAC GDX Bluetooth-based card reader technology, which has been specifically designed to meet the requirements of companies of all sizes that want the most secure access control solution possible. Experts from the company will be available for product demonstrations and to discuss a new online training program that has been developed to enable installers and end users to get the very best out of their PAC GDX solution. “It has been a tremendously exciting year, and we are looking forward to discussing our activities with those attending IFSEC,” commented Matt Kushner, Global President, Stanley Products and Solutions. “With a combined legacy of over 100 years in the security industry, 3xLOGIC, PAC GDX and PACOM lead the way in the design and manufacture of video surveillance, access control, and business intelligence solutions. By visiting Stand IF2930 and talking to our experts, visitors have a fantastic opportunity to find out how our technology can enhance security provision in a diverse range of built environments and how we can help them achieve their operational and security objectives.”
Allegion US, a provider of security products and solutions, and Open Options, a global access control solutions company, integrated the ENGAGE IP Gateway with DNA Fusion software to expand their offering of scalable security solutions. Open Options is a longstanding Allegion software alliance member and is committed to offering the most up-to-date technology available. The integration of the ENGAGE IP Gateway with Open Options’ DNA Fusion access control platform offers users another cost-effective option in their access control solution. Simplify Installation The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency. Ethernet connectivity provides the ability to connect to the network for real-time access control directly from an in- or out-of-network host to an edge device. To further simplify installation, the Gateway can be powered over ethernet (PoE), removing the need for separate power supplies or wiring. The ENGAGE Gateway performs regular, frequent communication between the Gateway and linked ENGAGE enabled devices. The Gateway is able to send commands such as lock, unlock and lock down from an IP host in real-time. Commands are executed in less than five seconds. As an Internet of Things (IoT) device, the Gateway leverages network security practices, including AES-256 bit and TLS encryption to provide customers with secure, dependable experiences. Real-Time Communication These secure communication protocols, in addition to real-time communication between devices, help to ensure the end user’s facility security is constantly monitored and allows access events to be addressed immediately. This solution also minimizes traditional hardware infrastructure, which provides the end user a smaller security footprint and cost savings. “Open Options is dedicated to providing open platform solutions, which is why we continually work with leading security providers to develop integrations that give end users a choice in their access control products,” said Ben Vestal, vice president of sales and business development at Open Options. “We’re excited to join with Allegion in offering our end users an opportunity to further enhance their security by utilizing real-time connectivity between their electronic lock and access control solution.” Access Control Software DNA Fusion is designed with valuable customer input to ensure it delivers a user-friendly and open access control platform DNA Fusion, Open Options’ award-winning open architecture access control software, seamlessly integrates with security systems like Schlage’s electronic locks, readers and credentials. Developed by experts with years of industry experience, DNA Fusion is designed with valuable customer input to ensure it delivers a user-friendly and open access control platform. Other supporting products—visitor management, photo ID and more—work together to provide a complete security solution. Numerous Allegion products have a deep integration developed by Open Options. The integration between DNA Fusion and the ENGAGE IP Gateway is the result of requests for additional solutions by the end user. Networked Access Control It can leverage an existing IP infrastructure to enable networked access control to doors traditionally ignored. “What’s great about Open Option’s DNA Fusion software is that it offers a full-scale access control solution that can be tailored to fit each customer’s unique security needs,” said Dewey VanVoorhis, electronics product manager at Allegion. “This integration offers end users yet another solution to expand security and convenience to more of their doors.”
AV collaboration and control pioneer Atlona, in partnership with new owners Panduit, will accentuate the importance of quality network infrastructure and connectivity in the AV over IP ecosystem at InfoComm 2019. Panduit, which acquired Atlona in January, will demonstrate its latest enterprise-level equipment racks, cabinets and connectivity solutions for AV environments in Atlona’s booth (3012), with a focus on helping integrators and end users streamline the installation and management of their core system architectures. Panduit Two-Post Rack System offers a reliable foundation for mounting AV and data center equipment“InfoComm provides us with an opportunity to close the knowledge gap around how to identify and choose the most appropriate Layer 1 infrastructure for each AV project,” said Amy Hacker, AV Commercial Strategy and Enablement Manager for Panduit. “We’re excited to speak with Atlona partners and customers about how Panduit can help them deploy Atlona products easier and faster with quality cable management, reliable infrastructure, and secure connectivity.” Solutions On Display At Infocomm Panduit will emphasize three solutions at its dedicated station in the Atlona booth: Panduit Two-Post Rack System: This dual-column data rack offers a reliable foundation for mounting AV and data center equipment, and is ideal for installation in enterprise-wide IT distribution closets. Its modular design offers side access with plenty of space to efficiently install, manage and organize cables, patch panels and other accessories, reducing installation times by up to 15 percent compared to competitive solutions. Panduit Wall-Mount Cabinets: Offering the same foundational strength and systems integration efficiency as Panduit’s two-post racks, these compact cabinets provide a secure and reliable solution for facilities requiring infrastructure and patching solutions in open spaces, or in equipment rooms with limited real estate. Panduit Field-Terminable Plugs: These modular plugs allow contractors to run horizontal cable direct to equipment, eliminating the need for jacks, surface-mounted boxes and/or patch cords – reducing installation times and upfront costs by up to 40 percent, while eliminating multiple points of failure. OmniStream AV Over IP Devices Panduit will populate the two-post racks and wall-mounted cabinets with Atlona equipment, including OmniStream AV over IP devicesPanduit will populate the two-post racks and wall-mounted cabinets with Atlona equipment, including OmniStream AV over IP devices – a springboard for a broader conversation about how quality infrastructure and connectivity will ensure that video, audio and data signal integrity is maintained across the ecosystem. Panduit representatives will also be on hand to discuss other infrastructure concerns, including the benefits and ideal scenarios of applying unshielded cable versus shielded cable, for example. “Beyond offering a robust and reliable infrastructure, we look forward to demonstrating how our systems provide the generous headroom and bandwidth required to support the higher resolution of 4K/UHD and HDR signals moving across the enterprise,” said Hacker. “Quality infrastructure directly relates to the quality of the AV signals being deployed. The better the quality of the cable and connectivity you have, the less you need to worry about pixel drops, fuzzy images and other undesirable visual artifacts.” InfoComm takes place from June 12-14 at the Orange County Convention Center in Orlando, Florida.
Arcules, the innovator of integrated video and access control cloud services, announces that it continues to add to its achievements by being selected as a winner in a variety of prestigious industry award programs. Its integrated cloud-based video service has been recognized for bringing significant value and intelligence to integrators, facility managers and end users across a number of applications. Arcules was selected as the 2019 Security Industry Association (SIA) New Product Showcase winner in the Cloud Solutions category for its Integrated Cloud Video Service during ISC West, the nation’s largest converged security trade show. Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier awards-based marketing program. Highly Competitive Program The Arcules Integrated Video Cloud Service combines untapped video and sensor data with the latest technologies in cloud and artificial intelligence to deliver actionable business and security intelligence for modern organizations. The cloud-based service is designed to ensure security, scalability, streamlined operations and bandwidth management — all from a single, easy-to-use interface. SIA’s New Product Showcase calls security companies to develop extraordinary, innovative products and solutions" “SIA’s New Product Showcase calls security companies to develop extraordinary, innovative products and solutions, and this year’s winners represent the best new offerings in the market,” said Don Erickson, CEO, SIA. “SIA congratulates Arcules for standing out among the entries in this highly competitive program to earn the Cloud Solutions New Product Showcase distinction.” Automatic Software Updates Arcules was also recently named as one of BUILDINGS Magazine's 2019 Money-Saving Products winners. Finalists were evaluated by the editorial staff for the money-saving qualities they offer to building owners and facility managers. The Arcules service reduces the burden and cost of system management, providing automatic software updates, maximizing system uptime and ensuring the most up-to-date version is available to users through the cloud-based interface. “Arcules continues to receive growing attention for our cloud-based services that encompass both video and access control, and we are honored to be recognized with these awards,” said Andreas Pettersson, CEO, Arcules. “This demonstrates the shift that the industry is seeing toward intuitive, agile and unified solutions that have the ability to harness the potential of the cloud for a number of applications. Arcules aims to be at the forefront of development in this space, and we welcome the chance to highlight these achievements across the security and IT industries.”
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings, factories, and healthcare facilities. Intrusion Security Panel “In the past, we have had systems that support commercial applications, but PowerSeries Pro is our first commercial intrusion security panel that can handle large commercial installations while eliminating the need for wires on sensors or keypads,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “We are excited to provide this new product to the commercial sector, and hope the increase in zones, coupled with secure encryption, will provide end users with the flexibility and reliability they need.” Tyco security solutions’ PowerSeries Pro includes built-in 128-bit AES encryption technology, supports multiple third-party integrations, including Building Management Software (BMS), as well as video and access control solutions to offer a versatile platform for holistic commercial security. Commercial Installations In addition, Frequency Hopping Spread Spectrum technology repeatedly switches frequencies to minimize interference of radio signals and prevent interception and obstruction during transmission. This is especially useful in commercial integrations, where transmissions take place over longer distances, and in turn require more planning to combat potential interferences security threats. Requiring no drills, wires or repeaters, both residential and commercial installations are hassle-free and provide all the power and security of a wired connection, without the wires.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionizing the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energized market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customized to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimized for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customized for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognize VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centers value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million people across the 50 states,” Mr. Li says. “The math just doesn’t work, which is why our country pays $1+ trillion in negative economic impact annually – a hidden tax we all pay in blood, tears and treasure.” Robots provide professionals with new tools. “We make really smart eyes and ears that operate 24/7/365 for an affordable price,” says Mr. Li. “We have actually operated more than 700,000 hours in the real world, both outdoors and indoors, across 15 states and are now operating across five time zones – fully autonomous without any human intervention.” Utilizing Robotics And AI AI helps Knightscope robots interact better with humans and perform activities like identifying peopleKnightscope is a security technology company that utilizes self-driving technology, robotics and artificial intelligence to provide security professionals additional eyes and ears to do their jobs much more effectively – as well as provide a consistent around-the-clock physical deterrence to help minimize negative behavior. Knightscope says its K1, K3 and K5 security robots, and accompanying user interface, the Knightscope Security Operations Center (KSOC), continue to make significant contributions to the safety of its client base. Artificial intelligence helps Knightscope robots interact better with humans and perform activities like identifying people, looking up license plates, detecting rogue wireless devices, having a machine-to-human dialog and, in the future, detecting dangerous objects in a scene automatically. “Our long-term plan is to have the machines be able to see, feel, hear and smell, so advances in sensor capabilities, efforts in sensor fusion, and the future with 5G capabilities will make for profound advances,” says Mr. Li. Facial Recognition Software At ISC West 2019 was Knightscope’s fourth time exhibiting at ISC West, and they have also exhibited at GSX/ASIS, ISC East, numerous other trade shows, and have hosted some of their own. Mr. Li has seen the reaction to security robots evolve over the years. People are realizing that the technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs “At first, it was typically ‘what is that?’ or ‘what does it do?’ But the last 12 to 18 months have been very different. There has been much more meaningful, implementation-focused dialog, feedback, requests for new features, etc. Now folks are realizing that our technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs.” Their ISC West presence this year highlighted facial recognition software that utilizes deep learning to detect, analyze and compare faces. Pechanga Resort Casino in Temecula, Calif., an existing Knightscope customer, is using the beta format on its K1 security robot platform. Additional Benefits Of Using Robots Knightscope has raised over $40 million to develop and deploy its technology and is backed by more than 6,000 family offices, accelerators, funds, private investors and four major corporations, says Mr. Li. As the machines get smarter and more capable over time – the number of applications will become endless" Robots also provide additional benefits beyond security, says Mr. Li, such as branding, community relations and public relations opportunities for clients. “In some cases, our clients have utilized our Concierge feature to allow for human-to-machine customer service interactions,” he says. “We have also been able to showcase and inspire STEM (science, technology, engineering and math) students with practical applications of technology for the good of society. And robot selfies have certainly become a thing.” Endless Number Of Applications In terms of vertical markets, in the near term, Knightscope has seen positive scaling and growth on corporate campuses and at logistics facilities, manufacturing plants, hospitals, casinos, commercial real estate and malls. “As the machines get smarter and more capable over time – the number of applications will become endless,” says Mr. Li. They currently drop new software code every two weeks and new hardware typically a couple of times a year. “In my opinion, it is ill advised for early stage technology companies to utilize B2G (business-to-government) sales as the initial go-to-market strategy,” says Mr. Li. “For Knightscope we have been primarily focused on B2B (business-to-business) sales and actually until 2017 were geographically constrained to California only. What we are doing is technologically extremely difficult as these are effectively self-driving cars. Additionally, despite the never-ending international interest, we are laser focused on the United States.”
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation Of AI And Deep Learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organizations strive to optimize business operations while also boosting security across their facilities. Actionable Intelligence Gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyze video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximizing Video Storage Customers are realizing that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximize video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realizing that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
With a large campus comprising historic and modern buildings and significant research facilities and equipment, the University of Otago has assets in excess of $1.4 billion (NZD). In 2006, an internal security review of campus facilities identified that a number of critical areas – including laboratories where medical research is conducted on animals and human cadavers – could attain an increased level of security and achieve greater cost efficiency through the installation of Gallagher systems. A key priority of the security upgrade was to replace the traditional lock and key system in place in facilities across campus with Gallagher’s electronic access control solution. By moving to an entirely electronic system, the University has mitigated the risks associated with lost keys and unauthorized access. Lost and misplaced cards are reported and immediately deactivated ensuring complete control is maintained over facility access. Comprehensive alarm monitoring The team at the University of Otago needed an auditable system, capable of identifying access by people, place, and timeThe electronic system also allows for comprehensive alarm monitoring per door and per freezer, ensuring campus security is immediately notified if a door or freezer has been left open. Gallagher’s Mobile Client, available with the Command Centre v7.30 security management platform, means these alarm notifications can be communicated directly to security personnel’s Apple iPhone devices providing valuable information in real-time, to those outside of the control room. More than simply managing the access permissions across campus, the team at the University of Otago needed an auditable system, capable of identifying access by people, place, and time. Gallagher’s Command Centre application provides this high-level of traceability and enables the University to quickly and easily extract the exact information required both for internal use and for the regulatory audits required of research facilities. Identifying who accessed which areas “Due to the nature and value of our assets, it’s critical not just to control who has access to facilities but to be able to identify exactly when areas were accessed and to know who was there,” said Deputy Proctor at the University of Otago, Andrew Ferguson. Key industry challenges Eliminate the security threat that comes with lost keys Enhance the level of security for critical areas including Medical Research laboratories Procure a solution capable of producing comprehensive audit trails Introduce a secure, automated facilities management system Gallagher security products installed Command Centre Electronic card readers Syllabus Plus integration Syllabus Plus integration Syllabus Plus enables automation in the scheduling and booking of resources and equipment Founded in 1869, the University of Otago is New Zealand’s oldest university. Ranked in the top 200 universities worldwide, the University of Otago is New Zealand’s primary medical tertiary institute and is considered the top research university in New Zealand. The Gallagher system installed at the University of Otago includes a Syllabus Plus integration. Syllabus Plus enables automation in the scheduling and booking of resources and equipment through Command Centre. The University of Otago team were quick to see value in the opportunity to synchronize their access control system with class time-tables, and subsequently manage room resources by automatically unlocking doors. Easily search and book resources A key benefit for the University was a move away from the manual process of entering room bookings into Command Centre. In addition to removing the labor associated with this manual process, the university also found a reduction in the number of booking inaccuracies caused when people changed their plans, as staff can now quickly and independently reschedule their resource and room bookings if their requirements change. “Smart scheduling gives authorized users in our wider team the ability to quickly and easily search and book resources,” said Ferguson. “It’s a genuine time-saver for us and ensures our facilities are managed efficiently.” The university has implemented an ongoing software maintenance agreement with Gallagher To ensure the University of Otago’s security system remains at the forefront of technology, the university has implemented an ongoing software maintenance agreement with Gallagher to ensure they receive the latest system developments as they are released. “We would never go without software maintenance, it’s imperative that our high-end security be the best it can possibly be,” said Ferguson. Training for system operators In addition to ensuring their security products and systems are up-to-date, the University of Otago also ensures their system operators undergo regular training. According to Ferguson, “We arrange annual training with Gallagher for our Campus Watch security team. The training teaches the team valuable tips and tricks on how to utilize the system to its fullest.” During the years since the initial installation of Gallagher security systems, the University of Otago has experienced significant savings associated with not needing to re-key facilities or replace locks when traditional keys have been lost or not returned – maintenance that the University estimates used to cost tens of thousands of dollars each year.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honor this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
A boiler business subjected to hundreds of thousands of pounds of theft has installed Palisade fencing, electric doors and barriers to combat the threat. Perimeter security specialists Fieg Access Systems (FAS Ltd) of Madeley have beefed up protection at the victimised business on recommendations made by security consultant John Bracewell. He recommended Palisade fencing from Wolverhampton steel fencing manufacturer Zaun Ltd, the first panels of which were delivered within a week. Bracewell said: “Their service was excellent; their product is always top quality; and their lead times and delivery were great – and the combination of measures should drive the thieves away.” Uncompromised site security Zaun’s Palisade fencing comes with either ‘D’ or ‘W’ and with three different pale head options – triple point, round and notched and single point – in heights from 1.2m to 3.6m. Palisade fencing panels can be easily raked to follow the undulations of the site without compromising the rigidity of the system or the security of the site. Zaun is the sole remaining manufacturer of Palisade, welded and woven mesh fencing systems that manufactures the entire system in the UK. FAS Ltd was initially set up to provide the end user with a repair and service provider of perimeter security and access control equipment. The business now fabricates its own gates and supplementary equipment from a factory in Madeley, Telford.
Ahli United Bank (AUB) is a leading financial institution providing banking, investment, and wealth management services from 147 branches in eight countries. Utilizing Gallagher’s business and security solutions in Bahrain since 2008, Ahli United Bank decided in 2017 to undertake a full upgrade of the systems at its headquarters. Installing controlled doors As part of upgrading the full product suite at its Bahrain Headquarters – which included all controlled doors and software – Ahli United Bank (AUB) also took the opportunity for a complete re-design of the set-up and locations of its security system. The bank was committed to finding a product that was cost effective and had a long life expectancy. While researching their options, AUB management saw a demonstration of Gallagher’s Mobile Connect technology and were immediately convinced that this was the ideal product for the bank’s upgrade. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone Gallagher Mobile Connect In late 2018, AUB began testing the new mobile solution on site then to be rolled out to most of its staff at headquarters. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone instead of an access card. A huge benefit for AUB is the solution’s capability to add additional layers of security where needed. Gallagher’s Mobile Connect solution provides the option to apply two-factor authentication via the smartphone – either fingerprint, PIN, or facial recognition – delivering heightened security over access to restricted areas. According to AUB’s management, the two-factor capability was very appealing to them. “Using mobile with facial recognition is far more secure than card and PIN, and it’s immensely more cost-effective than buying biometric readers,” they said. Temporary remote access control From an administrative and site management perspective, Gallagher Mobile Connect provides AUB with significant flexibility. Easy provisioning means that authorized staff can remotely allocate temporary access in advance and can also schedule when a user’s access can begin and end – ideal for visitors and contractors who come to the bank’s headquarters. Beyond Mobile Connect, readers and controllers, AUB uses Gallagher’s security software platform, Command Center, to manage alarms and access for its headquarters and all branches, all from a centralized location. “The power of Command Center is enormous,” said AUB’s Management. “It integrates with our CCTV equipment and gives excellent oversight of our operations.”
PotashCorp is the world’s largest fertilizer company by volume. They have facilities and business interests in seven countries and are dedicated to the challenges of feeding the world’s growing population. PotashCorp produces three primary crop nutrients – potash, phosphate, and nitrogen. Recognized as the world’s leading potash producer, they are responsible for 20 percent of the global capacity. Their facility in Lima, Ohio is one of four locations whose primary function is to create a range of products including ammonia, urea, nitric acid, and nitrogen solutions. Safety is PotashCorp’s number one priority, and this is evident in the number of awards they’ve received. Management are committed to providing a healthy work environment where employees have a strong personal safety ethic, rooted in awareness and focused on incident prevention. Implementing a cost-Effective solution We found that no other product could compare to Gallagher – its feature set, open API, competencies, and price"Security concerns and the need to implement a more cost-effective solution led PotashCorp to discover Gallagher. “We were looking for a system that would allow for seamless integration. After thorough research, we found that no other product could compare to Gallagher – its feature set, open Application Programming Interfaced (API), competencies, and price. The choice was easy,” says Jeff Johnston, Network Administrator for PotashCorp. “The cost of the product along with its capabilities is incomparable in the market.” It made sense for PotashCorp to replace their entire security system rather than updating an outdated and deteriorating system. Safe and secure working environment Driven to providing a best-in-class, safe, and secure working environment, PotashCorp partnered with the Digital C.O.P.S. Division of Perry proTECH, a business technology solutions company, and Gallagher, to develop a customized security solution. The system needed to be fully integrated, scalable and expandable, digitally based, and user-friendly. Benefits of PotashCorp’s new security solution include: Video integration, for safety precautions and oversight Wireless lock integration, utilizing Salto locks out in the field on network cabinets User-friendly report generation, creating cost and time savings PotashCorp will soon implement Gallagher Mobile Connect, a secure and convenient access solution that allows people to use their smart phone in place of an access card. Greater efficiency in plant turnaround Gallagher Command Centre provides the flexibility to easily add cardholders to the existing databasePotashCorp is required to undertake a plant turnaround every four to five years. A turnaround, or shutdown, is a scheduled period of non-production, during which day-to-day plant operations cease. All focus shifts to maintenance, cleaning, inspection, and repair, with employees and contractors working around the clock preparing the plant to resume its regular operations. Turnarounds are one of the most crucial events in the routine operation of a chemical industrial plant and are extremely costly, due to production time lost, increased labor costs and equipment expenses. Speed and efficiency is vital as the turnaround process has the ability to strongly affect a company’s bottom line. PotashCorp can have an additional one thousand contractors and staff onsite during a turnaround. Gallagher Command Centre provides the flexibility to easily add cardholders to the existing database, while enabling management and video operators to monitor cardholder movement throughout the plant. Executing a timely turnaround that stays within budget makes a huge contribution to the plant’s efficiency and drives the company’s future success. Immediate headcount in event of emergency Mike Resar, PotashCorp’s Safety, Health and Environmental Manager at the Lima site noted, “The safety of our employees and contractors is of the highest concern for us. We are now able to generate muster reports that provide an immediate headcount in the event of an onsite emergency. We can also produce time reports easily and without the need for external programming help.” By upgrading legacy system and performing the interface with Gallagher, PotashCorp realized a $20,000 savingOne of the world’s largest chemical companies and a leading manufacturer of petrochemicals resides on the PotashCorp site and shares several turnstiles. Both companies selected Gallagher, and a system-to-system integration was developed, allowing control of the turnstiles and several doors to be shared between the two companies. Tangible cost savings By upgrading their legacy system and performing the interface with Gallagher, PotashCorp realized an immediate $20,000 saving. As the system expands, the savings have continued. After thoroughly vetting their options, PotashCorp has found that the cost per door will be one-quarter less than that of their previous system. They are still witnessing a substantial return on their investment. With the recent addition of four controllers and twelve readers, selecting Gallagher has saved PotashCorp nearly $70,000. “The open integration, cost savings, and ease of reporting is truly remarkable. The difference and quality of the system is undeniable in comparison to what we had prior to Gallagher Command Centre,” says Jeff.
It creates challenges when a mechanical locking system grows organically over the years: Managers at South Denmark’s Syrenparken mental health treatment facility no longer had a trustworthy overview of all their physical keys in circulation. Yet, to serve the people treated there, Syrenparken must store medicines and psychotropic drugs. However, it is critical that only trusted personnel gain access. On-site access control solution As part of a modernization program, it was decided to upgrade on-site access control. One key aim was to replace old-fashioned keys, which can easily be lost, increasing the risk they fall into the wrong hands. Managers also wanted to make a working day more efficient for their trusted employees. They were each carrying three or four keys just to perform daily tasks in multiple areas of the site. Syrenparken installed the SMARTair wireless access control system from ASSA ABLOY to meet all their security needs Syrenparken installed the SMARTair wireless access control system from ASSA ABLOY to meet all their security needs. To date, 143 SMARTair wireless locking devices are fitted on resident bedrooms, as well as doors to offices, the medicine room and storage for patient records, plus other confidential areas. Staff and residents open doors with a standard, programmable MIFARE credential. SMARTair wireless access control system System reliability was a key factor in their choice of SMARTair, according to Henrik Jürs, Head of Syrenparken: "It is possible to put our access control system on a virtual server. Should a computer go down, we can put a new computer on and then we have access to it again. We trust the data security,” he emphasizes. Another important parameter was flexibility in system management: SMARTair makes it easy to administrate who should have access to which areas, and when. Instead of a bundle of keys, each employee has a key-card encoded with access rights to the exact areas they need. Online, offline access management With SMARTair, it’s easy to combine online and offline access management within the same installation With SMARTair, it’s easy to combine online and offline access management within the same installation. At Syrenparken, 133 offline SMARTair escutcheons and 3 updaters, plus 8 offline SMARTair cabinet locks, work side-by-side within the same system as 10 SMARTair online escutcheons. If a key-card is lost, it's quick to disable it and activate a new one. There is no danger anyone unauthorized will enter controlled medicine rooms with a lost card as a result. Because managers no longer need to call a locksmith to replace the compromised escutcheon, SMARTair is also a cost-effective solution for Syrenparken. SMARTair deployment is ongoing at Syrenparken — and currently projected to reach a total of up to 200 doors.
Round table discussion
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?