Arcules, the innovator of integrated video and access control cloud services, announces that it continues to add to its achievements by being selected as a winner in a variety of prestigious industry award programs. Its integrated cloud-based video service has been recognized for bringing significant value and intelligence to integrators, facility managers and end users across a number of applications. Arcules was selected as the 2019 Security Industry Association (SIA) New Product Showcase win...
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings,...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated Systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is showcasing the company’s newly designed Ambit Event Management Communications Software here at ISC West 2019 (booth #6065). Ambit’s powerful communications capabilities provides security management and first responders with real-time ‘human intelligence’ via users’ smartphone and tablets, along with a host of remote access control and geo-track...
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based, multi-platform solution, is featuring their new Self-Service Visitor Management Kiosk at ISC West this week. The kiosk is integrated with the SilverShield Visitor and Incident Management System to enable unmanned registration for visitors and guests. “Our Self-Service Kiosk helps organizations secure all of their entry points so they know who is on premises at all times, even those...
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based multi-platform solution, is demonstrating the capabilities of their visitor management and communication software at ISC West this week. Originally developed for school campus applications, the software incorporates a fully-integrated suite of modules including visitor management, lockdown initiation and much more. “Our desire for a better way to protect the students, staff and visitors at schools was the initial impetus for the development of the SilverShield system,” said Robin Baker, CTO, SilverShield. “Now we are expanding our focus to offer our unique solution to a wider audience, including medical-related facilities and businesses of all types.” Unmanned Visitor Screening Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time Designed to expedite emergency security procedures, the SilverShield Visitor Management System enables manned or unmanned visitor screening at all types of facilities. Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time. If there is a threat identified at any entrance, the system allows silent alerts to be sent immediately to designated stakeholders. You can also use the SilverShield system to create temporary ID badges, identify any known VIPs upon arrival, notify your staff of VIP or other visitor arrivals, and maintain a database of visitor history. When integrated with the SilverShield ID Badge System, the system can also generate permanent ID badging for staff, students, volunteers and vendors. The SilverShield Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or cellphone devices in case of an emergency. Visitor Management System This siren, audible even if the users are wearing earbuds or have other applications running on their devices, instantly prompts users to take immediate action to initiate their lockdown procedures. The SilverShield Incident Management System is a near-real-time alarm system that integrates directly with the Visitor Management System or can be used stand-alone. It can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, cellphone and web push notifications. The siren is audible even if the users are wearing earbuds or have other applications running The SilverShield Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not invited to your events. The system will manage RSVPs and can even issue parking and visitor passes to approved guests via email and SMS/text– letting event administrators increase control over their events. Learning Management System SilverShield Virtual Academy can be used for all types of security and other proprietary training. A video-based Learning Management System with lessons and assignments that you can create or purchase from SilverShield ensures that your staff is trained properly. The in-app SilverShield HR & Safety Resource Center connects schools and businesses with local, highly-trained security professionals to develop a security assessment, plan and documentation – ensuring your organization and staff is prepared and trained in the event of an emergency. The SilverShield Kiosk System empowers visitors to register themselves upon arrival – manually or by scanning a valid ID. Ideal for organizations with unstaffed entrances, the Kiosk System will quickly notify staff of VIPs or unwelcome guests, increasing security at all entrances.
Metrasens, a provider of advanced ferromagnetic detection technologies, announced that it will be unveiling the next generation of its mass casualty threat detection solution, Proscreen 900 Plus, at ISC West 2019 in Las Vegas. The new solution bolsters Metrasens’ impressive ferromagnetic screening product line and provides a higher level of security for stadiums, arenas, event venues, hotels, campuses and other areas where security is paramount. Proscreen 900 Plus demonstrates Metrasens’ commitment to innovation in the security sector and focus on delivering screening and detection technology backed by rigorous weapons testing and analysis. The result is high throughput, highly effective detection of large mass casualty threat items without the burden of divestiture. Proscreen 900 Plus helps mitigate the damage potential of bad actors in a mass casualty attack, and is ready to deploy today"In detailed weapons testing against a series of long barrelled firearms, the dual-screening methodology of Proscreen 900 Plus demonstrates an unmatched detection rate and throughput rate of 50-60 individuals screened per minute (3,000–3,600 per hour). With Proscreen 900 Plus, the screeners are placed at the outer perimeter of a facility or venue, detecting potential threats before any attacker can reach security chokepoints. Innovative Technology To Protect People “We live in a time where security for facilities and event venues has never been more important,” said Jim Viscardi, Metrasens Vice-President of Global Security. “Proscreen 900 Plus helps mitigate the damage potential of bad actors in a mass casualty attack, and is ready to deploy today. Our goal at Metrasens is to use innovative technology to protect people as best we can. With Proscreen 900 Plus, we are taking another step forward to making the world a safer place.” Maintaining Metrasens’ signature portability and battery-powered operation, Proscreen 900 Plus is a versatile solution for use in a wide variety of CONOPS. Customers will benefit from Metrasens’ high level of support, including site evaluations and assessments in working with partners and their business. Proscreen 900 Plus offers unobtrusive integration into surroundings so as not to disrupt the atmosphere In addition to detection capabilities and deployment versatility, Proscreen 900 Plus offers unobtrusive integration into its surroundings so as not to disrupt the atmosphere of its environment. This feature will appeal particularly to customers where subtlety is essential in maintaining a positive guest experience. Deployed For Healthcare And Data Security Metrasens is a pioneer in the use of ferromagnetic detection technology in commercial products and continues to produce innovative solutions with deep expertise in ferromagnetic technology development. Metrasens ferromagnetic technologies have been deployed in 46 countries across a variety of markets, including corrections, healthcare and physical data security. By striving for excellence in its mission for safety, the Metrasens team considers its innovation in security solutions to be more than just a job. Interested parties can visit Metrasens at ISC West 2019 at the Sands Expo Center in Las Vegas from April 10-12, booth #11143. Metrasens will be providing hands-on demonstrations of Proscreen 900 Plus. It will also be exhibiting its award-winning physical data security solution, Proscreen 500, which is ideal for data centers and government facilities to combat data theft.
ASSA ABLOY Door Hardware & Access Control is proud to announce that it will be exhibiting at the first ever The Security Event 2019, showcasing its latest security and integrated access control technology solutions. Taking place at the NEC in Birmingham from 9-11 April 2019, the show is a major new exhibition for the commercial and residential security market and is set to welcome more than 6,000 visitors. ARX Security System ASSA ABLOY Door Hardware & Access Control will be available on stand SE172, alongside Abloy and HKC, highlighting how efficient and easy to install its innovative access control solutions are for security installers. Products that will be exhibited on the stand include eCLIQ, CLIQ Go, SMARTair and Aperio, as well as its extensive electromechanical offering and the ARX access control and alarm system. eCLIQ Electronic Key ManagementeCLIQ is a fully electronic key management system that delivers flexible and secure master key management to businesses, solving key control concerns eCLIQ is a fully electronic key management system that delivers flexible and secure master key management to businesses, solving key control concerns. The compact eCLIQ locking cylinder offers the highest levels of security. With the widest range of different cylinder types, the system is designed for every kind of use, from the company entrance gate to securing alarm systems, lifts, doors and cabinets. eCLIQ also helps solve the issue of lost keys, with users able to update access authorizations when required. It is easy to install too, with no drilling required, and offers a maintenance-free solution for up to 200,000 cycles. As such, eCLIQ is the only master key system a building will ever need. CLIQ Go Electronic Locking System CLIQ Go is a fully electronic locking system based on the highly successful and efficient CLIQ technology. The CLIQ Go app provides a high level of security and data protection and enables control over building security from a mobile device. The flexibility of key management is unrivalled when it comes to master keying for building security. CLIQ Go provides both security installers and business owners with the capability to manage access control on the go, achieved via a quick installation that requires no witting at the door. Operators can also easily revoke access rights via the CLIQ Go app, miniziming the risk of lost keys. SMARTair is a wireless online or offline fully scalable access control system that keeps users in touch with everything that’s happening in a building – who enters, where and when – ensuring complete control of site security. The new mobile app Openow will be presented at The Security Event too, which becomes a smartphone’s secure virtual credential. Aperio Integrated Access Control Solution Aperio enables mechanical locks to be wirelessly linked to an access control system in a convenient and cost-effective way Aperio enables mechanical locks to be wirelessly linked to an access control system in a convenient and cost-effective way. With products meeting BS EN 179 and BS EN 1125 standards, Aperio can help schools, universities and commercial environments cut energy costs, reduce time money spent on maintenance, and help deliver a flexible access control solution that can be easily adapted and updated when needed. Part of the Aperio range, the new H100 door handle will also be on display. Packing the power and flexibility of wireless access control into one slim, cleverly designed door handle, the Aperio H100 offers easy retrofitting to almost any interior door. It integrates with all the existing Aperio integrations seamlessly and can work within an online access control system or offline as a standalone device. ARX Access control And Alarm System ARX is a security platform with integrated alarm and access control capability, covering everything from fully monitored high security hard wired access control doors to wireless Aperio doors, in both on and offline configuration. The technology supports MIFARE DESFire EV2 and HID SEOS, providing the most secure credential formats available, while being a future-proof system too – BLE Pando Reader provides the ability to use a smartphone as a credential. Fully-Monitored Door Security ARX creates a fully-monitored door environment, including electromechanical locks utilising ASSA ABLOY Hi-O technology Designed to easily integrate into third party security systems, and other ASSA ABLOY systems such as CLIQ and Traka, ARX offers an advanced graded alarm system, allowing deployment of dynamic lockdown with mobile notification to the ARX Go app. ARX creates a fully-monitored door environment, including electromechanical locks utilising ASSA ABLOY Hi-O technology. David Hodgkiss, Director of Access Control for ASSA ABLOY Door Hardware & Access Control, said: “We are delighted to be exhibiting at the first ever Security Event 2019 at the NEC in Birmingham, which will launch a new platform for showcasing the latest technologies and solutions available to security installers. As security threats become more diverse and complex, our latest solutions ensure security installers can specify a product for a customer that will overcome these challenges and deliver exceptional performance. We have a product offering that is truly unmatched, with one in every ten lock and security installations worldwide using our solutions. And with free coffee available on stand SE172 for anyone that comes and speaks to us about our access control offers, we look forward to welcoming everyone to our stand at The Security Event 2019.”
Booth number: 16115 Arteco is a global provider of event-driven intelligence solutions with a focus on ease of use and event management. Arteco's Video Event Management Software is designed to help users gain the most relevant video and security information at any given time by identifying critical events and areas of interest. Arteco’s research and development initiatives have united world-class, state-of-the-art video analytics and video management onto a single platform to optimize processes and reduce costs. Arteco provides a wide range of software and network hardware solutions that integrate with third-party systems such as video surveillance, video management and access control. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. At that time, the industry was just starting to embrace the benefits promised by IP-enabled devices, such as IP camerasWe first exhibited in 2006, and it opened our eyes to the opportunities within the North American market. At that time, the industry was just starting to embrace the benefits promised by IP-enabled devices, such as IP cameras, and there was a lot of discussion around how the network would affect the business of security. Today, not only have customers and partners embraced networked video and access control systems, but they are also going further by finding innovative ways to integrate their key business software with video and security data to increase intelligence. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? ISC West is one of the best avenues for displaying technology solutions and discussing how new innovations are changing the industry, so we find it critical to focus on the latest industry trends and themes that are emerging as a way to help customers solve their security challenges. Through highlighting our video management software solutions that leverage intelligent technologies such as video analytics, artificial intelligence and integration, we believe we can get the most out of ISC West by taking part in the conversation around addressing today's risk landscape with the most proactive and advanced methods and processes available. And this year, we have more to discuss with our focus on integration, intelligence and the user experience. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? We aim to help users in markets such as retail, education, cities, the cannabis industry and more comprehensively protect their facilitiesAside from the physically quantifiable leads and/or sales that come out of the show, obtaining ROI from ISC West is all about sharing our expertise and creating an intelligent and informative dialog about the most important challenges facing the industry today. We aim to help users in markets such as retail, education, cities, the cannabis industry and more comprehensively protect their facilities and make sense of a vast amount of data — and success at ISC West means that we've allowed these organizations to witness the benefits of Arteco Video Event Management Software and understand how they can be applied to their security and business strategies. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Not only is ISC West the biggest trade show of the year, but it also puts the right people together in the right place. Our team at Arteco always values the opportunity to attend ISC West because we consistently walk away with new knowledge through networking with fellow experts and discussing the latest security trends, allowing us to better serve our current and future clients. The special events and other activities make ISC West more than just a trade show; it is truly a collaborative space for our colleagues, partners and prospective customers to learn and grow together.
Princeton Identity Inc., the identity management company, announces the new IOM Access200w iris recognition reader, an environmentally sealed and impact resistant model designed for use outdoors as part of the company’s IOM Access200 biometric identity product family. The IOM Access200w is the first outdoor solution of its kind, which when integrated with access control platforms, allows customers to unlock exterior building doors without removing gloves or reaching in pockets to find access cards while delivering the superior security of iris recognition authentication. External Card Readers The IOM Access200w features an easily configurable PIN pad, integrates with external card readers, and provides immediate feedback to users with face capture. The reader is suitable for use in heat, cold, humidity, direct sunlight and low light conditions. The IOM Access200w processes subjects almost as quickly as the blink of an eye With its patented technology, the IOM Access200w processes subjects almost as quickly as the blink of an eye. Ideal for a wide range of applications, including college and corporate campuses, critical infrastructures, correctional facilities, airports, data centers and more, the IOM Access200 system’s distributed architecture allows users to network any number and combination of indoor and outdoor readers throughout a facility or multi-site environments. Securing Internal Spaces “Princeton Identity is pleased to be first to market with a biometric identity solution that offers the convenience, speed and security of iris recognition for use on building exteriors. Outdoor entryways are often the first areas of concern when designing a security program, and now our customers can leverage the use of this golden biometric on these exterior locations as well as for securing internal spaces,” said Bob McKee, Princeton Identity’s VP of Sales and Marketing. “With the addition of our new IOM Access200w reader, Princeton Identity offers a true end-to-end identity management system that’s unparalleled in its accuracy, security, convenience and flexibility, and an ideal enhancement to any facility’s access control and physical security solutions.” The IOM Access200w will be introduced at ISC West in Las Vegas, April 10-12. See it at the Princeton Identity booth 7079.
ReconaSense announces the latest release of its A.I. powered security platform for life safety and physical security, featuring risk adaptive access control and new IoT and building automation integrations that enable the secure flow of people, processes and information while keeping risks at bay. Digital transformation has increased the volume, variety and velocity of physical security event data being collected and stored, increasing the complexity of potential security risk factors as well as the time and talent required to identify and manage them. Physical Security Systems Data is aggregated and evaluated based on acquired and saved knowledge, then compared to user-defined policies ReconaSense features one-of a-kind, A.I. powered Neural Networking technology that helps campuses, commercial enterprises, government organizations and critical infrastructure identify anomalous events and automate risk adjustments and responses in real time. Unlike legacy physical security systems, ReconaSense can do this on a mass scale while filtering-out irrelevant ‘noise’ and avoiding false positives. A key component of the platform, ReconAccess is a risk-adaptive physical access control solution that adjusts permissions based on dynamic risk scores of personnel, assets, environments and facilities. Data is aggregated and evaluated based on acquired and saved knowledge, then compared to user-defined policies and procedures to determine what is permissible vs. what is not, and when and where to take action. Building Automation Systems The solution runs on Mercury hardware and integrates data from third-party systems, authentication solutions and building automation systems, enabling modern enterprises to proactively manage risk across countless dynamic and interacting components. ReconaSense facilitates intelligent access as much as it controls it. The solution can direct people to temporary safe shelter in the event of a natural disaster like a hurricane (correlating weather data with building occupancy information) or activate the lights and HVAC system when someone enters a building during off-hours. ReconaSense can also take preventive safety and security measures as in the case of a chemical spill ReconaSense can also take preventive safety and security measures as in the case of a chemical spill, identifying the presence of dangerous air-borne toxins, closing-off access to affected areas, and alerting operations teams to take emergency actions. Pre-configured risk thresholds and relationships between personnel attributes and facility resources help to facilitate a more automated, consistent and continuous approach to risk management, compliance, security enforcement and business continuity. Building Temperature Sensors A complete list of ReconaSense platform features includes: AI-Assisted Risk Scoring – monitors and compares data inputs over time to identify pattern abnormalities in physical, logical or human behavior and proactively alert to potential risks; examples include open/closed doors, building temperature sensors, NOAA National Weather Service updates, etc. Autonomous Guard Away – similar to an autopilot function, allows security teams to pass operations to one another as needed, or can automatically take over in emergency situations that require immediate response. Intelligent On-boarding & Access Provisioning – replace cumbersome paper-based processes with automated workflows, enabling security owners to easily authorize and regulate access to restricted areas based on roles, responsibilities and requests. ‘ORCA’ (Operational Response Command Application) – enables mobile access to critical operational information and the ability to act on real-time risks and threats while on-the-go. Web Services Integrations – provide the ability to integrate third-party APIs and pull information such as critical infrastructure data (nuclear facilities, airport operations, etc.) into Recon, the A.I. unification platform. Open Systems Compliance – provides out of the box integration with Z-Wave for IoT devices and BACnet for building automation systems for enhanced security and life safety monitoring. Avert Potential Threats ReconaSense with ReconAccess is the first intelligent access control solution that measures the real-time evolving risk of individuals" “In typical physical security systems, alerts are based on responses to breaches or events that have likely already taken place, putting lives and resources in harm’s way,” said John Carter, co-founder, president and CTO of ReconaSense. “ReconaSense with ReconAccess is the first intelligent access control solution that measures the real-time evolving risk of individuals, assets and environments while automatically adjusting access permissions and step-by-step processes to avert potential threats or disasters.” To learn more, register to attend the webinar Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.) on Thursday, March 7 at 2pm ET. Following the webinar, ReconaSense will host the grand opening of its new Technology Center on Fifth Avenue in New York City, from 3-7pm ET. New York-area architects, engineers, system integrators, security consultants and facilities managers are invited to attend.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems And Video Surveillance As A Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video And Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies. Topic: Robotics And Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place In Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics In Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future. Topic: Voice Control In The Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favorable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing Knowledge Of Attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition Of Public Safety Equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armor, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armor, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security For Oil And Gas Companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organizations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focused on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection For Enterprises ISC East has traditionally focused on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localized show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
Keynote speakers will kick off ISC West Day 1 and Day 2. Keynote sessions are open to anyone, and ISC West organisers look for speakers with broad-based appeal, either from the government or related to security strategies, standards and measures. Timely and newsworthy topics are included as a means of educating attendees on the best way to protect their own facilities. On the first day of the exhibition, April 10 at 8:30 a.m., the Keynote Speaker will be William Bryan of the Department of Homeland Security (DHS). As science and technology advisor for DHS, Bryan leads research, development, innovation and testing and evaluation activities. An Army veteran with 17 years of active military service and three years in the Virginia National Guard, Bryan brings a wealth of experience gained from multiple leadership roles in the U.S. Department of Energy (DOE) and Department of Defense (DoD). Safeguarding Public At Stadium Butler has been responsible for the personal security of Prime Ministers, Presidents, and members of the British Royal FamilyThe Day 2 Keynote, Thursday at 8:30 a.m., will be given by Russ Butler, Vice President of Security for the San Francisco 49ers and Levi’s Stadium. A former Scotland Yard Police Officer, Butler led a team of specially trained and equipped police officers tasked in the 1980s with safeguarding the public at soccer matches throughout the UK during the height of organized soccer violence. He was also a SWAT Team Leader for Scotland Yard, and has been responsible for the personal security of Prime Ministers, Presidents, and members of the British Royal Family. Butler has been involved in planning and executing notable events such as Super Bowl 50, ‘WrestleMania’ and this year’s College Football Championships. The ISC West conference program, provided by the Security Industry Association (SIA) and branded SIA Education@ISC, is expanding this year to 85-plus sessions, with something for everyone, whether they are an end user, dealer/installer, consultant, or are focused on a specific vertical market. The conference program speaks to every audience segment at the show. Enhancing Organization’s Cybersecurity Attendees will leave the session with a self-created model including concrete recommendations to enhance their organization’s cybersecurityCybersecurity will be a bigger topic than ever, and among the new speakers will be Johna Johnson, CEO and Founder of Nemertes Research, whose session will enable end user participants to quickly and accurately ‘score’ the maturity of their cybersecurity initiatives. Session participants will use handouts to rate themselves and their current success based on operational metrics, deployment of key ‘bellwether technologies’, and organizational and operational best practices. Attendees will leave the session, planned for April 9 at 10:15 a.m., with a self-created model including concrete recommendations to enhance their organization’s cybersecurity. Another new speaker will be Hector Alvarez, President of Alvarez Associates, a specialist in workplace violence prevention. His presentation, April 9 at 2:45 p.m., is geared towards security, safety, risk managers and HR staff who are new to threat management/workplace violence, or experienced professionals who can benefit from reviewing the foundational steps. Addressing Threatening And Concerning Behavior The sessions, on April 10 and 11, provide exhibitors an opportunity to educate and provide demonstrations to their customer base on new technologiesReal-world vignettes will be reviewed, including those with both negative and positive outcomes. The session will enable attendees to recognize the warning signs of individuals on the pathway towards violence, and to identify a range of intervention and response options to address threatening and concerning behavior. Free Vendor Solution Sessions are another popular feature of the ISC West conference program. The sessions, on April 10 and 11, held in meeting rooms near the exhibit hall, provide ISC West exhibitors an opportunity to educate and provide demonstrations to their customer base on new technologies. They are free to any ISC West badgeholders. Some of the sessions attract large attendance, and preregistration is provided. Presenting companies include Axis Communications, StarLink Fire, FireLink FACP, Hikvision, Intel, Verkada, and IBM.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking Measures To Prevent Counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working Of The System The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining Cloud Authentication With NFC Tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless Facial Recognition System Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early Success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time And Attendance System Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Located southeast of Los Angeles, California, the City of Whittier hosts a water pumping utility installation that provides water to the businesses and residents of the surrounding Gateway Cities Region. In recent years, the installation routinely suffered attacks by vandals and looters, resulting in regular defacement with graffiti and the theft of copper components from pumping stations. This caused interruptions in service to businesses and residents across the surrounding cities. To ensure the security of the water installation and avoid public health and safety concerns, the City of Whittier turned to a virtual guarding solution from iNet Security LLC. iNet Security leveraged comprehensive monitoring from the Surveillance Acquisition Response Center (SARC), powered in part by IDIS technology, for a high-performance video surveillance solution that has already shown powerful results. Enhancing Multi-Site Security And Safety The City of Whittier turned to a virtual guarding solution from iNet Security LLC With the health and safety of the City of Whittier and its surrounding region potentially at risk, it was essential that any security solution deployed by the city be dependable, effective, and capable of low-maintenance 24/7 monitoring. The system also required ease of remote use as the installation is located in a remote wildlife preservation area far from the city center. Any surveillance solution had to: Secure multiple locations within a remote wilderness location Manage authorized access to installation premises Maximize security of the installation with encryption speeds capable of constant live monitoring Provide compatibility and integrate seamlessly with SARC virtual guarding systems Enable the coordination of live responses to security events Feature intuitive software that is easy for users to operate and master. Representatives of the City of Whittier reviewed systems from several manufacturers before they determined that the virtual guarding solution from iNet Security, powered in part by IDIS, would best meet their requirements. DirectCX Technology And Center VMS The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology SARC and the City of Whittier leveraged technology from the high-performance and cost-effective IDIS DirectCX solution and IDIS Center video management software (VMS) to meet their remote monitoring needs. The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology. IDIS incorporated its expertize in image processing to provide unrivaled HD recording performance at an affordable price point for the responsibly cost-conscious City of Whittier. Designed for simplicity, convenience, and performance, the DirectCX technology and the powerful, full-featured IDIS Center VMS incorporated by iNet Security have proved to be optimal components of the comprehensive solution, meeting the challenges faced by the City of Whittier. IDIS HD-TVI DVR The most powerful IDIS HD-TVI DVR, the TR-4116 16 Channel Full HD Recorder, offers: Support for HD-TVI, 960H, and analog cameras Up to 480ips Full HD recording Full HD display with HDMI and VGA output Support for CVBS spot monitor Long distance transmission over coaxial cable Support for HD-TVI camera OSD control over coaxial cable Expansion up to 32TB using 4 SATA interfaces and 1 eSATA storage interface One click network configuration using IDIS For Every Network (FEN) service Dependable Security Environment IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations In partnership with iNet Security and SARC, IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations. Within the first week of installation, a group of vandals was caught attempting to fault the installation fence and was successfully deterred remotely using SARC’s remote “voice-down” protocol. In a dramatic security and safety success, the system was used to coordinate a fast and effective response to two isolated fires as well as a dangerous wildfire that threatened both the utility and surrounding wildlife. SARC operatives utilized IDIS technology, in part, to accurately and quickly guide first-responders through the remote wilderness to the site of the fires, minimizing damage and risk to the surrounding areas. Thanks to the power and performance provided by the iNet Security solution, including IDIS DirectCX technology, the City of Whittier is benefiting from: Low total cost of ownership Unparalleled ease of use through the IDIS Center VMS Complete dependability of system components Lower system maintenance requirements A scalable solution to allow for expansion to additional installation sites
Critical infrastructure requires locks that are proven, tested and trusted. Sometimes electronic locking is the right choice; at other times, mechanical locking does the job. With CLIQ mechatronic locking technology, one water utility combined both in a single, secure system controlled by powerful, intuitive CLIQ software. O des Aravis is responsible for water capture, storage quality, analysis and delivery of around 700,000m3 annually to homes and businesses in the Aravis Mountains region of France. PROTEC2 CLIQ key-based access control with programmable, battery-powered keys now secures 30 opening points across their premises. These robust locking devices are suited to protecting high-security openings, including a potentially dangerous room with high-tension electrical cabling and equipment. They are already deployed at critical infrastructure sites all over Europe. Controlling And Modifying Access Rights The mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important accessThe mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important access. They know who goes where, and when. They are aware of activity affecting all critical doors; it is even impossible to leave one unlocked. Because CLIQ is a flexible, key-based system, O des Aravis can also retain some mechanical locks at the site, operated by the same secure keys and with the same PROTEC2 high-security disc cylinders. CLIQ software makes it easy and intuitive for O des Aravis to manage their entire locking system. “The programming software platform is very simple to use. We can easily grant or forbid access rights to any user,” explains Laurent Schutz, Water and Sanitation Process Manager. CLIQ Web Manager Software The CLIQ Web Manager software is built to help companies like O des Aravis manage complex workflows. System administrators can program, amend or delete keys remotely. It’s straightforward to generate time-stamped audit trails for any lock or key, to track access in detail. The Web Manager can generate attendance reports for staff and contractors. Yet despite all these features, the CLIQ Web Manager requires minimal IT investment: it runs in the cloud and is accessed via an encrypted connection to a standard web browser. On Demand Audit Trails Of Lock/Key If a key is lost, a security manager can deactivate it instantly with a couple of clicksAt O des Aravis, comprehensive audit trails for any lock or key are available on demand. These also sync automatically when a user key is updated or revalidated. If a key is lost, a security manager can deactivate it instantly with a couple of clicks, ensuring buildings and clean water supplies are not put at risk. “There is very good communication about software updates,” says Laurent Schutz. “It is highly professional.” We live in a world of diverse threats to our critical infrastructure. For Aravis Mountains residents, winter skiers and summer hikers, these refreshing alpine waters are safely locked down — thanks to CLIQ wireless access control.
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?