The premiere of CEFE powered by INTERSCHUTZ attracted numerous visitors in Shanghai in 2019. Now the international trade fair was scheduled to kick off with its second edition from 9 to 11 December 2020. The situation regarding the coronavirus pandemic is such that the platform for fire brigades, rescue services, civil protection and safety/security will not be back for exhibitors and visitors until a year later. The exact date for the event at the Shanghai New International Expo Center (S...
June brings a new vcore software release. Vaion has continued to focus on features that bring more value to the user’s organization and their security team. With the 2.2 release, they introduce the ability for anyone to develop access control integrations with the vcore video management system, as well as privacy masking to vcam devices. The new generic access control API allows Vaion, access control vendors, or third parties to develop a proxy that facilitates the integration between the...
In what has been the most challenging period in the company’s event planning history, it is with great sadness, that Nineteen Group confirms the postponement of their September events; The Security Event, The Fire Safety Event, The Health and Safety Event, The Facilities Event and The Emergency Services Show. All shows due to take place this September, have been postponed to 27-28 April 2021 at the NEC. The company thanks everyone for bearing with them during this incredibly difficult tim...
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of Infrared Cameras Inc. (ICI) to its network. Infrared Cameras Inc. is an innovator in the infrared products space with a line of thermal cameras as well as multi-spectral infrared cameras and complete package systems. “The COVID-19 pandemic forced an unprecedented acceleration in demand for thermal monitoring devices,” said Bill Bozeman, Chief Executive Offi...
The world has changed with the COVID-19 pandemic. There are many new challenges and regulations. MOBOTIX’s intelligent video technology can support companies, institutions, public as well as private facilities during the crisis and in the restart after the lockdown. MOBOTIX has bundled the available "back-on-track video technology solutions" for its partners and customers to help get them up and running quickly and effectively. This makes it easier for industries and sectors such as retai...
The U.S. Chemical Safety and Hazard Investigation Board (CSB) has announced issuing a video safety message and a safety alert entitled ‘2020 Hurricane Season: Guidance for Chemical Plants During Extreme Weather Events’. Video and safety alert The video and safety alert highlight recent actions by the Center for Chemical Process Safety (CCPS) to produce industry guidance meant to help hazardous chemical facilities better prepare for extreme weather events. CSB Chairman Katherine Le...
Paxton Access is introducing free customized learning course, new products and a brand-new guide to assist installers in helping their customers ensure their buildings are COVID-secure. The initiative has been designed in line with the CDC and OSHA best practices and recommendations. In a new, 45-minute webinar, Paxton will show installers how to match their security offering with the ‘practical considerations of how to operate safely in the workplace’. A globally renowned manufacturer and provider of access control solutions firm, Paxton is also launching a new release for Net2, specially developed to support social distancing. Aiding enterprises to resume operations Like many installers, Paxton recognizes they have an important role to play in helping companies across the country update their buildings and reopen their businesses safely and securely to support the economy. As a global manufacturer with over 35 years expertise in securing buildings, the route for Paxton is always through educating their trusted network of security installers to deliver genuine solutions for the real world. Paxton’s recent series of webinars have seen over 2,700 installers attend. Importance of access control in protecting people Access control plays a key role in helping ensure buildings are COVID-secure" Gareth O’Hara, Chief Sales Officer at Paxton said, “As a manufacturer of technology, in partnership with installation companies, we have an opportunity to positively contribute to protecting people against COVID-19 infection.” Gareth adds, “Access control plays a key role in helping ensure buildings are COVID-secure. At present, thousands of buildings across the country are implementing new measures according to CDC and OSHA recommendations. Right now business owners are strategizing on how to safely transition people back to offices and work environments in a secure way.” Implementation of Net2 solutions He further said, “Our message to security installers is: Please don’t wait. We want them to start becoming familiar with the guidance and Net2 solutions and support their customers in making their buildings COVID-19 secure. From the webinar, to the supporting technical information, to the new Net2 release and free customer guide, we believe they will have everything they need.” Paxton’s team of researchers has been thoroughly reviewing the CDC and OSHA recommendations to ensure the most relevant, up to date information is shared with their customers. The result is a webinar packed full of useful advice to help installers reach out to their customers with confidence. The session covers 4 key areas: Contactless entry & exit – Hygienic access, move away from touch-based devices Flexible access permissions – Meet social distancing guidelines, limit high traffic and apply one-way flow of movement Occupancy management – Control and monitor people numbers in any given area and support social distancing Thermal scanning – Use cameras to ensure health and wellbeing in high security areas and identify people that could be at risk, quickly Occupancy Management As part of the new plan, Paxton is introducing an Occupancy Management feature in Net2 As part of the new plan, Paxton is introducing an Occupancy Management feature in Net2 and various improvements to integration with thermal scanners to give installers the best options for safe, secure access. Due for release in July 2020, Net2 Occupancy Management allows you to limit the number of people in any given area; either barring access or sending an email/text to the building manager when a space nears capacity. It works across multiple areas of a site and can be set to operate a one in, one out system to support social distancing measures. Adam Stroud, Paxton CEO said, "We understand the important part that access control has to play in managing the flow of people around a building to support a hygienic environment. In addition, controlling the density of people in any given area is a valuable tool to help businesses of all types to become 'COVID-secure'.” Net2 access control system Adam adds, “Net2 access control system is widely used in the U.S. and so we developed the new Occupancy Management feature to meet this specific need. For new and existing Net2 customers we hope that this new functionality helps the efforts that we are all making to observe social distancing and keep people safe." Paxton has also created a useful digital guide for end-users which explains in easy terms what to ask their installer to make their building COVID-secure. Ensuring buildings are COVID-secure Our new COVID-secure with Net2 customer guide should help anyone, even if they have no knowledge of access control" Katie Millis-Ward, Divisional Director of Communications said, “We genuinely want to help our installers help their customers. Providing insight into the variety of best practices and recommendations to make it simple for both the installer and the end customer is something we are ready to do.” She adds, “There’s a lot of information for businesses to digest to make buildings safe and we hope we have broken it down into a digestible format so people can get started with confidence. Our new COVID-secure with Net2 customer guide should help anyone, even if they have no knowledge of access control.” Guide to COVID-secure Buildings with Net2 webinar Paxton Access Ltd. offers a vast product range that includes IP technology, wireless and battery powered access control solutions to provide reliable security for any site or building requirement. The company is well positioned to offer both the installer and the end-user with innovative access control solutions to make their lives easier. Paxton Access Ltd.’s new webinar, the Guide to COVID-secure Buildings with Net2 starts on June 30, 2020 and runs each Tuesday and Thursday until July 16, 2020.
As organizations around the world resume operations, new requirements for creating a safe workplace for employees are driving the need to automate approaches to manage employee social distancing and conduct contact tracing. HID Global, a worldwide provider in trusted identity solutions, announced landmark additions to its HID Location Services IoT ecosystem that simplify and streamline managing these protocols, and drive compliance to federal, state and local requirements to help prevent workplace exposure to COVID-19. HID BEEKS™ Aware fob The new HID Location Services for Workplace Safety physical distancing application leverages Bluetooth Low Energy (BLE) HID BEEKS™ Aware fobs that alert employees when they are closer than 6 feet (2 meters) for a specified period of time. The new contact tracing application uses the same HID BEEKS Aware fob or a BEEKS badge/badge holder that is easily added to existing ID cards, providing a full digital trail of an employee’s whereabouts and historical interactions while at work. This makes it possible to rapidly respond to cases and activate isolation procedures as needed. The physical distancing application is currently being piloted and adopted by major healthcare institutions and enterprise organizations worldwide, including at HID’s North American headquarters and manufacturing facility in Austin, Texas. HID Location Services for Workplace Safety “Digitally managing social distancing is critical to encouraging the necessary behavioral shifts that will create a safer and more secure environment to which employees feel comfortable returning to work,” said Mark Robinton, Vice President of IoT Services, Identification Technologies with HID Global. “Our goal with HID Location Services for Workplace Safety is to use our established IoT ecosystem to help organizations restore productivity with confidence by making it easier for everyone to adjust to workplace physical distancing and taking the manual leg-work out of contact tracing.” Its real-time time monitoring and analytics capabilities can help ensure compliance Employers define distancing policies and alert parameters; zones can be created with geo-fences around high-traffic areas (breakrooms, hallways, lobbies) to minimize large congregations of people. HID BEEKS Aware BLE fobs are issued to employees, visitors and contractors to carry while at work. Using peer-to-peer capabilities, the fob will flash and sound a brief audible alert when employees are within 6 feet (2 meters) for more than 2 minutes (or as configured by administrator). Contact tracing reporting With a click of a button, detailed reporting enables contact tracing using historical data on movement and interactions in order to trigger safety protocols. For standalone contact tracing, employers can couple the functionality with existing employee ID badges. Fast set up using HID BEEKS devices, secure HID Bluzone Cloud Software, and HID BluFi™/ other gateways. Immediate access to real-time analytics that include location data such as interaction type and contact duration (including start and end times). Uses existing enterprise networks or Bluetooth over Wi-Fi network connectivity and cloud services to simplify implementation. No additional infrastructure, hardware or network wiring needed. Building upon a proven IoT ecosystem HID Location Services is already in broad use by Fortune 500 companies for managing building occupancy, optimizing office and facility space, asset tracking and monitoring the health of equipment. The latest workplace safety additions to HID Location Services underscore the IoT ecosystem’s ability to quickly scale and adapt to the dynamic requirements of today’s hospitals, manufacturing facilities, and enterprise organizations. Its real-time time monitoring and analytics capabilities can help ensure compliance to a number of other safety requirements, such as hand hygiene policies and other regulations introduced as part of the “next normal.” Organizations are able to leverage their investment beyond today’s global health crisis, since HID Location Services lays the foundation to easily add even more IoT applications-all of which can be centrally managed on a single platform.
As hospitals, manufacturing establishments, large retail stores, and public-facing businesses strive to put in place health screening measures to minimize the risks of outbreaks, they often have to rely on manual processes that are time-consuming and error-prone. To address the challenge, Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions is working with customers on new ways of using Genetec Mission Control, the decision support system of Genetec Security Center, to help automate the screening process for employees and visitors entering facilities. Decision management system Mission Control also keeps track of every step of the response process, enabling comprehensive after-action review Genetec Mission Control is a collaborative decision management system that is already widely used by airports, critical infrastructure organizations, and security departments to coordinate incident response through greater situational intelligence and guided action. Designed to eliminate doubt, it filters out noise to provide the essential data, insights, and tools needed to respond to situations quickly and collaboratively. Mission Control also keeps track of every step of the response process, enabling comprehensive after-action review and continuous improvements to standard operating procedures. Mission Control can also be used to streamline screening processes and ensure accurate record-keeping. Maintaining safety compliance The system digitizes the screening questionnaire used by the organization and walks admission personnel through each step to identify individuals requiring additional assessment. It also centralizes the data collected and automates supervisor notification. With Mission Control, customers can significantly speed up the screening process while maintaining safety compliance and minimizing operational disruption. Whereas most solutions either require custom coding or the involvement of the manufacturer, Mission Control provides an intuitive configuration interface that lets administrators create a tailored questionnaire to guide personnel performing the screening and automatically identify the need for additional verification. Connected security systems “This is a great example of the unique value offered by Mission Control,” said Gabriel Labrecque, Mission Control Product Manager at Genetec. “Where traditional decision management systems are slow to adapt and hard to use, customers are able to tap into the capabilities of Mission Control to rapidly address an emerging challenge. This is done by simply using out-of-the-box Mission Control features and tapping into data from their existing security systems.” Key features of Mission Control for screening applications include: Centralized data: Mission Control leverages data from connected security systems to streamline screening, eliminating the need to extract and record data in multiple locations. Guided operating procedures: The system automatically identifies individuals requiring secondary screening based on questionnaire responses, instead of relying on personnel following offline procedures. Automation: When employees are delayed by secondary screening or sent back home to self-isolate, data is automatically tracked, and managers and employees can receive a copy of the screening questionnaire. Dashboards: Using Security Center dashboards, customers can keep track of the latest screening metrics to measure efficiency, track trends, and assess resource allocation, as well as the impact of screening on an organization. centralized data collection Mission Control offers an intuitive design and administration interface. Procedures can be created and customized in a few clicks, so that screening staff can easily keep up with changes to guidelines. Its centralized data collection provides real-time data from each screening station.
Incedo is an access control system that can adapt to a business’ individual security needs. Businesses can benefit from one system that links all security solutions a building may have and integrate them into one easy to manage system. Building security Access control regulates how people can enter and exit a building and can offer insights into the movements of staff and contractors. Incedo includes a personalized interface that combines hardware with a cloud-based system offers a high level of security and operational benefits, including access management and audit trails. As well as integrating existing systems, Incedo can also adapt to work with future hardware if a business decides to invest in new security equipment, which includes both Abloy and third-party products. This allows the system to easily adapt with time, saving businesses reinvesting in a new operating system in the future. Businesses are increasingly understanding that a locking solution can offer far more than just a method of securing a building, and connectivity offer greater control. The impact of a lost or stolen mechanical key is that the room or building is no longer secure. With Incedo, a lost or stolen key can be revoked via the management platform, removing all threats of unauthorized access. Audit of employee movement Access control offers the flexibility and fluidity that businesses need. When employees or contractors require access to areas of a building, Incedo delivers connectivity and simplicity to manage the movement of people. The purpose is to create safe surroundings and protect the people and goods within the workplace. Incedo is a future-proofed solution, with scaling capabilities more individuals and access points can be added Incedo benefits everyone, from installers to end users. Facilities managers can enjoy increased control of the premises and detailed audit trails of employee’s movements. The management software will provide information on who, when and where an area is accessed in real time. End users will have an individually programmed keypad access code or card reader that will provide access all areas they are authorized to enter. In addition, those that require ever-changing access rights can have increased access granted in a matter of minutes, which also can be provided with a timed access feature. Software for integration with CCTV Incedo is a future-proofed solution, with scaling capabilities more individuals and access points can be added to the system by system integrators. The software also integrates to all security elements of the business, including CCTV, to combine the data into one place rather than in multiple systems. Incedo can update and adapt when new hardware is introduced. Businesses all have their unique security challenges, hardware and software configuration is tailored to one’s needs, and can be changed when needed. New Incedo-enabled hardware from Abloy UK and third-party provider are accessible within the Incedo platform. To find out more about Incedo other new products and services available from Abloy UK, one can register for the upcoming virtual exhibition.
Informa Markets, in consultation with its exhibitors and event partners, has made the difficult decision to reschedule IFSEC International and its co-located shows. This postponement and rescheduling cover the following events: IFSEC International Counter Terror Expo, Forensics Europe Expo and World Counter Terror Congress (Organized by Clarion Events) FIREX International Safety & Health Expo Facilities Show Intelligent Building Europe Workplace Wellbeing Show Communities come together We know how important our events are as a forum where our communities come together to learn and network" Originally set to take place on 8–10 September 2020, the events are now scheduled for 18–20 May 2021 at ExCeL London. Chris Edwards, Group Director for IFSEC International said: “We know how important our events are as a forum where our communities come together to learn, network and meet suppliers." "We have a proud track record of hosting the largest gatherings of any event in our industry in the UK, and often beyond, and no one is more disappointed in this decision than us, but after much deliberation we are sure that this is absolutely the right thing to do in the circumstances.” Safe and secure environment “Our focus over the last three months has been on ensuring that we can provide a safe and secure environment for our visitors, exhibitors and staff, and while we felt confident of achieving this we also have a duty to our customers to provide an event that matches the standards they expect of us. Additionally, these events have strong international participation and this would be severely compromised given the current restrictions. “After carefully considering the options and following discussions with exhibitors and event partners it became clear that postponement is the most sensible option. We welcomed many thousands of industry colleagues during our Digital Week in May and we continue to develop our online platforms to offer additional ways of connecting with the wider industry." Connect with audiences online We will be working closely with our exhibitors and industry partners to shape a reunion to remember" "We will continue to work with our customers to help them connect with audiences online using both our existing platforms and several new initiatives due to launch later this year.” David Townsend, Event Director, CTX, Clarion Defense and Security, also commented: “CTX is an important milestone for security professionals from industry, infrastructure, government and policing to network and do business. So, while we are of course disappointed not to be holding the event this year, the decision is in the best interests of our customers, attendees, and suppliers." Counter-terror event "In addition, as a strategic counter-terror event with a global audience, a significant proportion of this audience typically travel from overseas. Given that governments around the world are continuing to advise against international travel at this time, we believe the most prudent course of action is to focus on bringing the community back together at CTX in May 2021. We will be working closely with our exhibitors and industry partners to shape a reunion to remember.” Chris Edwards added: “As each of our communities look to rebuild and recover in 2021 our team will also be working hard to ensure we return next year with an event that brings people back together for the reunion everyone will be crying out for. Details on how our events will continue to evolve and develop for next year will be forthcoming over the summer.”
Redline, an Air Partner company and a renowned provider of global security solutions, announced that it has won a long-term contract with the CAA, and is now also providing consultancy services to private aviation company Jet Edge. The CAA has awarded Redline a seven-year contract to be the UK’s sole certifier and quality assurer of free running explosive detection dogs (FREDDs). The certification and quality assurance process is set by the Department for Transport (DfT) and overseen by the CAA, which is responsible for ensuring that it operates effectively. In addition, private aviation company Jet Edge has engaged Redline to develop standard operating procedures (SOPs) across its entire operations in light of the ongoing COVID-19 pandemic, from aircraft decontamination to in-flight operations. International facilities management Redline has curated this service to support operators through this difficult time after it successfully developed and implemented a series of COVID-19 SOPs to operate aircraft and security screen passengers for its repatriation of UK and Irish nationals from Japan on behalf of the UK government. Jet Edge called on Redline in order to give its clients comfort that all necessary precautions have been taken to mitigate the risk of exposure to the virus when traveling with the company. These business wins follow the recent announcements that Redline has also secured two long-term quality assurance contracts with Aéroport Nice Côte d'Azur and the international facilities management company OCS Group UK, as well as a contract to provide security consultancy support on a HS2 project. Demonstrating clear value CAA contract adds to our forward long-term contract portfolio, further increasing recurring revenues" Mark Briffa, CEO of Air Partner, said: “Despite the difficult circumstances posed by COVID-19, Redline has already secured a number of prestigious contracts in the financial year to date, thereby demonstrating the clear value of its offering. The CAA contract adds to our forward long-term contract portfolio, further increasing visible and recurring revenues for the Group, as per our stated strategy." "I am extremely pleased with the company’s performance since acquisition, in both the aviation and non-aviation sectors, and look forward to seeing what the rest of the year has in store for this exciting part of our business.” Explosive detection dogs Paul Mason, Managing Director of Air Partner's Safety & Security division, added: "Redline has been a trusted supplier of security solutions to the aviation sector for 14 years now, and these two business wins demonstrate the breadth of the services we offer in this area. In recent years, we have established ourselves as leaders in explosive trace detection, and we are proud to now be certifying and quality assuring free running explosive detection dogs on behalf of the UK government." "In addition, we are delighted to be helping Jet Edge to navigate the challenging COVID-19 operating environment and safeguard their clients, drawing on our expertise from the extensive and successful evacuation work we carried out earlier this year.”
A person infected with the Coronavirus (COVID-19) infects an average of 2.5 other people within five days. You do not need to be a mathematician to realize that early detection of infected people is key to successful pandemic containment. The aim of effective containment strategies is therefore not so much to reduce the number of absolute cases as it is to extend the time frame within which they occur. Without effective containment measures, the virus spreads rapidly and is beyond the capacity of the health care system. However, if infection rates can be minimized through early detection and rapid, targeted identification of further infections, cases will continue to occur over a longer period of time and remain within the capacity of the health care system. Identifying, testing and results For example, the goal of many countries is to carry out as many Corona tests as possible to quickly identify infected people. It is then necessary to identify and reach potentially-infected people and isolate them in quarantine. This is a tried and tested procedure. But this method also costs valuable time in the fight against the virus and has many unknowns. The determination of a concrete test result alone sometimes takes up to 48 hours due to limited laboratory capacity. Added to this is the imprecise and slow procedure for determining contact persons. Or do you still remember exactly who and where you shook hands with in the last ten days - and could you provide information on this? Security technology to the rescue When it comes to the time factor, security technology can be a great help. Thermal imaging cameras and temperature sensors, for example, can help to detect a person with elevated body temperatures. Fever can also be one of the symptoms in those infected with the Coronavirus. At neuralgic points such as airports and train stations, or at entrances to hospitals, thermal imaging cameras can quickly reveal which people have fever. Presumably infected people can be easily separated and asked about other symptoms. Physical security technology can make a great contribution here. Dr. Frank Gillert, a professor at the University of Applied Sciences in Wildau, Germany states, however, as one of the leading scientists for logistics-centric security research, he demands "rapid innovation in dealing with situations like COVID-19 should be a priority". He sees enormous potential in the possibilities of IT and artificial intelligence; "We should use the disruptive changes that are currently taking place and that are challenging global orders to strengthen the significance in IT infrastructure development and also in security technology development.“ The goal in a global crisis And he is right: In global crises such as the Corona pandemic, security-related deficits become apparent and space is created for technical innovations. The goal of governments and companies is to restore security and save human lives as quickly as possible. The German data analytics powerhouse G2K, for example, has developed a Corona Detection & Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. When developing the system, the focus was on two questions: How do I detect a suspected infected person in crowded environments and even more importantly, how do I quickly and comprehensively determine the person's contacts and previous whereabouts, and find correlations and patterns in this information? The data experts of the Berlin-based company found the answer in the combination of physical security technology and their existing data analytics platform. The G2K system The system is based on G2K's scalable IoT platform "Situational Awareness Builder" (SAB), which is already in use in several projects worldwide and sets standards in process automation and process optimization, including security management. As soon as a person with fever is detected by the system, he or she can be immediately screened to avoid contact with other people and thus prevent possible new infections, i.e. to interrupt the chain of infection. For this purpose, stationary thermal imaging cameras or smartphones equipped with a temperature sensor accessory can be used. The potentially infected person must now be registered and referred to a doctor or hospital for further specific diagnostic measures. The entire process is covered by a mobile G2K application. A combination of security and medicine The platform can bring together available hospital capacity, infection reports, movement and contact profiles and provide an excellent picture of the source of infection. Thus, medically necessary isolations can be implemented quickly. At the same time, infected patients can use the app to document their recovery and become actively involved. All this data is centrally managed and analysed, using deep learning methods. This provides crisis managers with a single monitoring, control and resource management tool that enables immediate action to be taken to combat the spread of the virus and gives officials full transparency on the status of the pandemic. Karsten Neugebauer, founder and CEO of the company behind the solution, explains his commitment as follows "A few weeks ago we too were faced with increasing difficulties due to the Corona crisis. As we have a strong presence in Europe in particular, we had to struggle with postponed project starts and limited resources". But instead of burying their heads in the sand, G2K's dedicated team decided to declare war on the virus." "In our entrepreneurial duty, we, therefore, decided to use our available technology and equip it to fight COVID-19. Our team has been working day and night over the last few weeks to expand our software platform to enable us to contain the pandemic quickly and effectively. Politicians must now immediately push ahead with the unbureaucratic implementation of prevention and control measures such as our CDCS to ensure the stability of our public systems," demands Karsten Neugebauer. The pandemic continues As the COVID-19 pandemic spreads from continent to continent, researchers around the world are working to develop antidotes to the virus. As long as this has not been found, the spread of the virus must be slowed down internationally. Only by this can system-relevant infrastructure be held consistently. Combining modern physical security technology with platform technology and artificial intelligence provides an excellent possibility to slow down the current and for sure, future pandemics.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
Toyota Argentina has been operating in the country for 26 years. It represents 40% of the exports of automotive companies in 2019 and currently has an annual production capacity of 141,000 units, exporting 75% of its production to 22 Latin American countries and to the Caribbean. Toyota’s Zárate plant in Argentina, which was closed due to COVID-19, is ready to reopen with new regulations to ensure the security of its employees. Given the need to apply a health protocol against the pandemic and resume a safe operation, Toyota Argentina carried out an analysis of the new technologies on the market and chose the Dahua Thermal Body Temperature Monitoring Solution for its high quality and high cost-performance value. Safety at the factory Due to the large number of people entering and leaving the factory every day, the automaker required a safe and efficient solution to help them control the commuting staff (including 1,500 employees that take buses, 900 employees that use parking lots and 700 contractors) without delays, while complying with the new government regulations. The solution included 4 sets of Dahua Thermal Body Temperature Monitoring equipment (DHI-NVR4216-I + TPC-BF-5421 + Blackbody). They were installed in different entrances, providing a non-invasive way to check the body temperature of their employees at the same time, ensuring that the temperature of the people entering the plant is normal. Maximising employee security “This situation took us from having two production shifts before the pandemic to one production shift only, having to rise the number of buses to bring employees and contractors to the plant, as well as applying additional security measures in dining rooms, common areas, and production line for social distancing and cleaning and hygiene measures,” said Alberto Martín López, Corporate Security Manager at Toyota Motor Corporation. The training of personnel was also conducted to allow them to be familiar with the equipment"“Before this implementation, every shift entered and leave the plant in 30 minutes. Now, maintaining a rhythm of fluid access and social distancing, we do it in 45 minutes but in a more secure way, ensuring a competitive timing and maximizing our employees’ security,” explains López regarding the immediate benefit of the solution in the daily operation of the company. Production resuming “The installation and calibration was relatively quick. The Zárate Plant was operational in 3 days, with the addition of some infrastructure improvements on the entry/exit areas, since work was carried out in semi-open places and the impact of climate changes had to be reduced. In this period, the training of personnel was also conducted to allow them to be familiar with the equipment and to ensure the equipment’s usage life,” he added. The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners In addition, López also mentioned that “The current COVID-19 protocol was also implemented, randomly testing staff that reaches about 100 tests daily. These types of new technologies facilitate and maintain a safe production operation and care for our employees and contractors, allowing us to comply with the demand of our customers.” Business security The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners and can screen massive number of employees at a safe distance, enabling efficient entry/exit access for employees. It provides security guarantee for Toyota Argentina’s reopening and routine operations, while meeting the government’s business resumption requirements. "This technology allows companies to return to business in an orderly manner and be compliant with the measures dictated by official entities. This reinforces Dahua Technology's commitment to provide solutions that aid prevention measures during this pandemic. The objective is to be able to continue offering solutions that facilitate community care by supporting the economic business resumption of industries,” says Franky Su, Dahua Technology Country Manager for Argentina & Uruguay. Specific solutions and products might vary depending on the different regulations and measures for COVID-19 in each country.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
Aeroturn LLC, a turnstile manufacturer that offers 100% Made In The USA turnstiles, announced that the company’s turnstiles were selected for deployment at multiple locations of a major Biopharma manufacturer in North America. Biopharmaceutical, also known as a biological medical product, or biologic, is any pharmaceutical drug product manufactured in, extracted from, or semi-synthesized from biological sources. Upgrading security Different from totally synthesized pharmaceuticals, they include vaccines, blood, blood components, allergenics, somatic cells, gene therapies, tissues, recombinant therapeutic protein, and living medicines used in cell therapy. With the current global health pandemic, the Biopharma manufacturer needed to upgrade the security at its central US location quickly and efficiently. Over the years, Aeroturn has been instrumental in helping this Biopharma giant secure multiple campuses where security needs to be at the highest level. With a heavy focus on research and development, the Biopharma company was looking for a turnstile solution that could operate without any downtime and secure its perimeter effectively. With major security upgrades over the years which warranted finding the best turnstile manufacturer in the industry; the decision was solely based on performance. 10 million passages guarantee After researching multiple vendors and receiving live product demonstrations, the physical security team knew that Aeroturn was the clear winner. “We are proud to have been selected as the winning turnstile solution after competing against two other large well-known turnstile manufacturers,” states Michael Stoll, VP of Technical Sales & Marketing at Aeroturn. “Aeroturn won the initial project back in 2018 and all future installations based on superior reputation, performance specifications, durability, endurance, our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” With a phased approach, Aeroturn won Phase I in September of 2018 and deployed four lanes of its enhanced X-Wing turnstiles with custom LED’s that matched the corporate colors at the Biopharma company’s North American headquarters. Phase II consisted of an additional 11 lanes of X-Wing turnstiles that were deployed the following year at another North American campus. Customized turnstile solution After proving themselves over the course of two years, Aeroturn was selected once again in 2020 to complete Phase III with an additional 8 lanes of turnstiles and the remaining to be deployed at the end of 2020 at the same campus. Each location came with its own set of customized floor conditions, side entry cabling, and low-profile platforms when necessary; making this a customized turnstile solution. In addition, all work was performed off-hours and weekends to help minimize disruption at the facility at no additional cost to the Biopharma company. Due to the current national emergency, the Biopharma company needed to be proactive when it came to securing its entrance ways and knew it could rely on Aeroturn to deliver high performance turnstiles each and every time.
Optex installs intrusion detectors at a gated, luxury motor coach resort community in the desert area of Southern California. The property features a clubhouse, fitness room, community pool, and 141 "Casitas": 1200 sq ft. custom-built living spaces with waterfront motor coach pad. Because most owners were on site only a portion of the year, the property faced an increasing issue with trespassers in the off- season months. The increase in trespassing also lead to an increase in vandalism and theft cases. The large perimeter, combined with the desert heat, required a robust, long distance solution that would stand up to the elements. Detection range of 650 feet The integrator worked directly with OPTEX to plan out a perimeter system that would overcome the challenges faced on the site. Because power was readily available and a long distance solution was required, hardwired AX-650TF beams with a detection range of 650ft. were selected. After discussing possible mounting options with the OPTEX sales representative, the integrator decided on the AX-TW200 photobeam tower. Because the customer provided a site plan, OPTEX was able to pre-build the towers and mount the beams in them at no additional charge. Once installed, the tower and beam solution provided full perimeter protection by activating strobes and notifying an on-site guard to the location of an intrusion. The result was a huge decrease in the amount of unknown trespassers, thus greatly reducing reports of theft and vandalism.
A very high-risk site belonging to a large and well-known cash handling business was located in a busy commercial complex. The company had identified a security weak-spot in its facility - namely the roof and the skylights within the roof. They had considered using active infrared beams, but these had been discounted because they could not cover the entire roof space. CCTV with video analytics was also considered, but similarly discounted since it is easily affected by varying light and shadow conditions, and its reliability could not therefore be depended upon. REDSCAN unit can protect a flat roof The solution was to install REDSCAN to cover the whole surface of the roof and skylights, integrating the detection units with the existing alarm system so that any potential intrusion is alerted. The detection area of the REDSCAN was easy to set up to the exact shape and size of the roof; a single REDSCAN unit can protect a flat roof. The sensitivity of the target object size and speed can be adjusted to dramatically reduce the possibility of false alarms from birds or fog. The weak spot identified by the customer is now secure, giving peace of mind to the end user. False alarms are at an absolute minimum due to the laser technology and the ability to set the detection area.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Automatic Vehicle Identification: State Of The Industry 2020Download
11 Considerations For Embedded System RFID ReadersDownload