Maxxess Systems, a provider of event response management and collaboration systems, is pleased to announce the integration of OpenEye Web Services (OWS) with Maxxess eFusion security management software. eFusion is presently installed in thousands of facilities around the globe enabling security personnel to more precisely monitor and assess potential and emerging threats, and quickly respond to emergencies. This new integration enables the Maxxess monitoring software to retrieve video from Ope...
Airspace security technology pioneer Dedrone has been awarded certification from the UK’s Center for the Protection of National Infrastructure (CPNI) for its counter-drone technology platform DroneTracker. DroneTracker detects, tracks, and identifies drones by using multi-sensor capability combining RF, radar, and optical sensors. The new CPNI drone detection standard is the first official validation of counter-drone technology. It enables organizations deemed to be of critical national i...
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Businesses, banks, stores, event organizers and VIPs are their main clients. Their demand is increasing, mostly due to the expansion that Southern California has experienced in the latest years. Small cities and towns are increasingly growing every day, mostly due to internal migration and the high prices of rent in Los Angeles County. Veteran Los Angeles security company HillQuest Security kn...
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customized Speed Gate that is an ideal solution for controlling access to offices, schools, universities...
Allied Universal®, a security and facility services company in North America, acquires APG Security - a South Amboy, New Jersey - based company offering manned guarding and investigative services on a national level. Terms of the deal were not disclosed. “APG Security’s talented management team has built a reputable business offering top-of-the-line security services on a national level,” said Steve Jones, CEO of Allied Universal. “This acquisition is part of our lon...
Rapiscan Systems, a global supplier of security inspection technology, is exhibiting at this year’s International Security Expo (Stand D30, 3-4 December, London Olympia). The company will demonstrate its security and screening technology excellence with its products and solutions for the aviation, event security, critical infrastructure and law enforcement sectors. Highlights on the stand include the RTT 110 Explosive Detection System, Itemiser 4DN Narcotics Trace Detection, the 920CT adv...
Konica Minolta is making the next big advance in intelligent video technology by launching the MOBOTIX 7 smart solution platform and the M73 IoT camera that uses it. The latest generation of MOBOTIX video cameras offers a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. The M73 comes with more than 15 apps integrated into its camera software, which can be used to optimize business processes in practically any industry. Integrated facial recognition MOBOTIX 7 is the by far powerful and decentralized and secure modular IoT video system" "MOBOTIX 7 is the by far powerful and decentralized and secure modular IoT video system based on ‘Made in Germany’ and Deep Learning modules, jointly developed with Konica Minolta" explains Gary Fletcher-Moore, Head of Sales – Intelligent Video Solutions, Konica Minolta Business Solutions (UK) Limited. "With the MOBOTIX 7 platform and its new range of intelligent apps we will revolutionize numerous IoT processes for our customers." By combining image sensors and environmental sensors with AI-based analytics, industrial enterprises can increase their production efficiency and improve preventive maintenance or fire prevention measures. For transport applications, the integrated facial recognition, traffic monitoring and object recognition capabilities ensure that drivers are immediately aware of hazards, thus improving road safety for drivers, passengers and other road users. High-Quality professional market The new MOBOTIX M73 IoT camera features high-octane processor technology, meaning it easily provides the latest state of the art in camera performance, such as 4K resolution at 30 fps or 120 dB WDR (Wide Dynamic Range). Only high-quality professional market and partner solutions are integrated In keeping with current demands, the camera is also highly energy efficient: despite a total power consumption of less than 25 watts (PoE+), each M73 is a complete video system that features 8-GB DVR as standard — so no additional servers or storage devices are required. The pre-installed apps come with a 30-day free trial, after which users can purchase a license for each app as required. Only high-quality professional market and partner solutions are integrated, all of which have been tested and certified by MOBOTIX as meeting the highest standards in terms of quality and cyber security. Intelligent video monitoring This opens up countless applications for use — for example, one of the MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded. In this case, the camera immediately and automatically triggers a diversion for any further persons wishing to enter the building, thus reliably preventing accidents and panic. There are no limits to the applications the camera can be used for There are no limits to the applications the camera can be used for, and the solution platform is particularly suitable for sectors such as building engineering, energy, civil engineering, industry and production, public services, retail, healthcare, and education. The examples given above show that intelligent video monitoring means much more than simply recording footage and analyzing it. Highest level of cybersecurity Together with MOBOTIX, Konica Minolta aims to develop a multitude of other solutions based on artificial intelligence to help predict events and facilitate the early introduction of effective countermeasures aimed at protecting the environment, buildings, systems, people or animals. The MOBOTIX 7 and M73 provide apps with functions such as the ability to recognize faces, characteristics, age, mood or sex, as well as specialized custom solutions. "MOBOTIX 7 meets the requirements of a wide range of industries, including transport, retail, industry and public services, as well as fire prevention," says Gary Fletcher-Moore, adding: "The MOBOTIX systems had to have the highest level of cybersecurity in order to be released on the market in accordance with global standards such as ONVIF."
Allied Universal®, a security and facility services company in North America, and SOS Security®, a renowned provider of global security services, announces that a definitive agreement has been executed with respect to a transformational merger that creates a security leader in North America and beyond. “I am thrilled to welcome Edward Silverman - one of the most highly regarded leaders of the security industry - and the SOS Security team to the Allied Universal family,” said Steve Jones, CEO of Allied Universal. Providing new security solutions SOS Security brings a complementary and scalable approach to security services to Allied Universal “Like Allied Universal, SOS Security has built a renowned and respected brand of security services. Now, working together, we will be able to combine the best of both brands to elevate security services, the breadth and reach of capabilities and opportunity to provide new security solutions.” Founded in 1969, SOS Security brings a complementary and scalable approach to security services to Allied Universal. With offices in five countries, SOS Security's 15,000 employees work around the world providing safety, security, executive protection, intelligence, consultancy and advisory services, including more than 2,000 assignments last year in over 100 countries through its subsidiary, AS Solution. The company has among the highest retention rates in the industry with respect to customers and security personnel. Comprehensive and integrated technology solutions The joining of Allied Universal and SOS Security establishes the company as a truly differentiated service provider in the global security industry with: A combined force of over 230,000 security professionals; Combined best practices to elevate security service delivery and industry norms; SOS Security’s unique capabilities in international markets and intelligence analysis; Allied Universal’s highly advanced, comprehensive and integrated technology solutions; Expertise in risk management specializing in security consulting, investigations, personal protection and threat, disaster and emergency response; High-level crowd management, event staffing and consulting providing a one-stop solution for event and site security. Delivering personalized services Following the merger, Silverman, the CEO and Founder of SOS Security, will serve as Co-Chairman of the Executive Committee and an Advisor to the Board of Directors, bringing his vision of scalable boutique security service to Allied Universal. “Delivering personalized services, whether operating under a billion or at $10 billion, has always been my mission,” said Silverman. “As part of Allied Universal, and with shared values and purpose, we have a remarkable opportunity to bring specialized security services that reflect client priorities and attract the best resources and strategic partners to the industry.”
Allied Universal®, a security and facility services company in North America, acquires Vinson Guard Service, Inc. - a New Orleans, Louisiana - based company offering manned guarding services throughout the Gulf Coast and Southeastern United States. Terms of the deal were not disclosed. "We cannot be more pleased with this acquisition as Vinson Guard Service's well-established platform, highly skilled security professionals and a proven track record of providing superior security solutions will ideally complement and enhance our business moving forward," said Steve Jones, CEO of Allied Universal. High-Quality security services Since 1963, Vinson Guard Service has been providing exemplary security solutions to clients and is seen as one of the largest family-run security providers in the United States. A former security officer, Joseph Vinson, Sr., started Vinson Guard Service more than 55 years ago with the vision of offering high-quality security services with a focus on top-notch client satisfaction. With revenues in excess of $24 million and more than 750 employees, Vinson Guard Service provides services in the following states: Alabama, Texas, Georgia, Mississippi, Tennessee and Louisiana. "I am extremely impressed with Allied Universal's breadth of services and capabilities which is definitely a win for our clients," said Christine Vinson, President & Chairwoman of the Board at Vinson Guard Service. "We are also excited for the opportunities this allows for our employees as it relates to their professional advancements and security careers."
Under the headline “Start-up since 1919”, EVVA presented the company to journalists from eight countries at a two-day international media event from 13 to 14 November 2019. True to EVVA's innovative spirit, the event started with a start-up tour of Vienna. On the second day, the media representatives were able to participate in an exclusive press conference and tour of the Wienerberg facility where they were given personal insights into the site and a current outlook on future challenges and new opportunities - keyword ‘digitalization’. In the conference, Stefan Ehrlich-Adám, CEO of the EVVA Group, Michael Kiel, Group Division Executive of Operations and Johann Notbauer, Group Division Executive of Market Innovation and Technology reported on the most important milestones since EVVA was founded 100 years ago. In addition to this, they presented upcoming product and manufacturing innovations and gave an outlook on the future of security technology. Mechanical locking systems Having witnessed constant innovation since its foundation in 1919, the internationally renowned and recognized supplier of high-quality security systems has been successfully combining tradition with innovation for 100 years, making it one of the world’s leading manufacturers of mechanical and electronic locking systems. Stefan Ehrlich-Adám, CEO of the EVVA Group, gave an outline of the company, “Since the company was founded as the ‘Invention, Experimentation and Application Institute’, it has been defined by courageous and forward-looking entrepreneurship and the pursuit of innovation”. EVVA's innovative strength is visible in the invention and patenting of the GPI and MCS mechanical systems A successful example of EVVA's innovative strength - and at the same time an important milestone in the company's expansion - was the invention and patenting of the GPI and MCS mechanical systems, which are still important today, four decades ago. But the permanent further development also continues for the mechanical locking systems. “As patents expire after 20 years, we need to continually develop mechanical locking systems and come up with new ideas.” EHRLICH-ADÁM explains. Electronic locking systems The cultivation with in-house electronic locking systems division on the European market demonstrates EVVA's pioneering spirit. In the 1970s, the Viennese family-owned company EVVA was considered to be the world’s first company in the industry to use computer programs to calculate and control the most complex master key systems. Meanwhile, Xesar and AirKey are well-established on the market and they are a unique solution for the challenges of global megatrends in the security industry. “We had a head start with our in-house development when electronic locking systems were introduced about 25 years ago. And from the very beginning, we had important expertise in the area of mechanical locking systems and to this day we are constantly striving to complement this as well as possible with electronic access control systems. The combination of mechanical locking systems and electronic access control systems is the technically sensible response to the specific security and organizational needs”, said Ehrlich-Adám. In-house research and development We aspire to invent and develop durable, very high-quality products in-house; therefore we have an in-house research and development department, which has grown substantially in recent years. “The engineering is done by us and we decide on the product concept. We know the market, the customers and know which solutions the operators expect”, explained Ehrlich-Adám. EVVA employs around 460 people at the main production facility in Vienna and has rapidly increased its workforce, particularly in the area of electronic systems and software, coupled with ongoing investments in machinery. For EVVA, the transition from mechanical systems to mechatronic systems ultimately means an increased need for technicians and software engineers. “Going forward, we will also invest in staff who are able to assist with installations”, Ehrlich-Adám explained. In addition to securing and creating jobs, the Viennese family-owned company is also pursuing a targeted CSR strategy at the site, which is being implemented through the Clean Production Approach. The proportion of clean production is currently at 60%. EVVA locking systems EVVA locking systems have been installed throughout the world, for instance, on the Queen Mary ocean liner In addition to the main site in Vienna, there are now a total of ten subsidiaries throughout Europe and a network of already over 1,000 electronic and other mechanical locking system sales partners. These are an important factor in our further expansion and international success. Interesting target markets include Southeast Asia and Australia. EVVA locking systems have been installed throughout the world, for instance, on the Queen Mary ocean liner, in Copenhagen's opera theater, the new Juventus Stadium in Turin, as well as St. Stephen's Cathedral in Vienna. “Our well-developed sales network is one of our greatest strengths. Our core competencies include the project planning, calculation and realization of large systems,“ Ehrlich-Adám said. Industry 4.0 and excellence In the second part of the conference, Michael Kiel, Head of Operations, outlined EVVA's status and its plans in the area of Industry 4.0. “EVVA does not see Industry 4.0 as just digitalization, but also a variety of opportunities for its own development of excellence. We have defined four development focus areas for our claim to excellence associated with Industry 4.0: Digitalization; Automation, Site development Collaborations. Our highest priority has always been, and will continue to be, to bring “the people” with us, through the relevant qualification measures and participation in projects”, Kiel explained. Digitalization A flagship tool for ‘lived digitalization’ is EVVA’s Order Fulfillment Tool, which was developed in-house. It provides order support by showing the current status of orders. With the Next Generation Cross Link Production (Xpro) project, EVVA is pursuing several goals: On the one hand, the goal is to create a blueprint for a flexible manufacturing system. To achieve this, in collaboration with TU Vienna, EVVA ‘digitally upgraded’ a machine, adding collaborative robotics to it. On the other hand, we are also accelerating digitalisation in the sense of going “paperless” with drawingless Computer Aided Manufacturing (CAM), which is already in use as a prototype. Automation For EVVA, the mid-term goal is to use ‘digital twins’ to create fully digital models of production to plan and optimize processesFor EVVA, the mid-term goal is ultimately to use ‘digital twins’ to create fully digital models of production to plan and optimize processes and procedures. To achieve this, a digital production plan with simulation and optimization will be implemented by 2020, as part of the AutProSim research project with the Fraunhofer Institute. “By 2023, EVVA will invest a volume of 20 million euros in shaping the development of excellence, of which two thirds will be spent on high-quality automation solutions”, Kiel explained, adding “We will particularly drive forward new technologies for 3D printing of plastic parts for machine construction and image processing for testing scenarios that are integration into the automation line.” Collaborative robots But EVVA is also increasingly using collaborative robots (cobots) to support employees in simple, monotonous tasks, such as sorting. “Using automation, we can bring certain tasks and consequently orders from low-wage countries back to the Wienerberg facility. Apart from reducing errors and raising the qualification level, cobots will allow EVVA to increase its competitiveness”, Group Division Executive Michael Kiel explained. On the topic of site development, Kiel explained why Industry 4.0 is connected to internationalization. “As part of our Powerplant Strategy with satellite sites, in the future the three sites of Vienna, Tišnov and Krefeld will become a Powerplant, meaning that they will be production units for the manufacturing of components and automated assembly. In turn, the satellite sites will consist of eight Europe-wide distribution sites for manual assembly of smaller production batches.” By 2023, EVVA plans to have established all Powerplants and satellite sites as a unified process chain. Collaborations EVVA is a co-partner of the Austrian Center for Digital Production on research of end-to-end digitalisation Finally, Kiel outlined the various research collaborations as the fourth development focus area on the path to excellence. For instance, we have worked together with TU Vienna on feasibility studies on the possible ways in which cobots can be used or machine-to-machine communication solutions in production. EVVA and the Fraunhofer Institute are The University of Vienna, in turn, is supporting EVVA in the development and expansion of the centurio.work production platform. Furthermore, EVVA is a co-partner of the Austrian Center for Digital Production (CDP), where, among other things, we are researching end-to-end digitalization from order placement through to production and delivery. A look into the future “For EVVA, however, the aim of excellence development is not just about continuous development, but about regularly determining our position. For example, next year, EVVA will face the industry benchmark, “Fabrik 2020 – die beste Produktion Österreichs” (Factory 2020 – Austria’s best production),” Kiel concluded. Finally, Johann Notbauer, Group Division Executive of Market Innovation and Technology reported on trends and developments, also based on recent impressions in Silicon Valley at ARM and Microsoft. In his view, the possible scenarios are based on two future technologies: 1. Artificial intelligence (AI) and machine learning, linked to 2. Connectivity. Both topics are also linked to the disruptive changes for the security technology sector. Machine learning According to Notbauer, machine learning will be disruptive, as machines in the future will be “intelligent” – and therefore the processing and evaluation of the continually calculated data will be done by the machines themselves. Various other possible applications arise from linking digital data with physical data. Digital data is generated through the various touchpoints; physical data refers to diverse sensory data. In the future, we will be able to gain an even greater understanding of how end components and entire systems are used by combining these different forms of data in a targeted way. Intelligent systems The calculated algorithm would be able to recognize when and for which component a battery failure will occur" Notbauer described an application example “For instance, for a Xesar system it will be possible in the future for all ‘intelligent’ components to continually measure their own voltage curve and this data could then be centrally evaluated in a ‘neural’ network.” “The calculated algorithm would be able to recognize when and for which component a battery failure will occur. In turn, this optimizes the sustainability and maintenance costs of the system and gives the sales department valuable information for a required modernization of the whole system. The added value and benefit for the customer consists is in “predictive maintenance”, i.e. failure-free operation linked to cost-optimized maintenance”, explained Notbauer. Connectivity The second biggest driver of innovation is connectivity, as a result of the many new opportunities that the game changing 5G has opened up. “5G makes it possible for us to connect production machines directly to the cloud. There is no longer any need for a local programmable logic controller, which is time-consuming to program. This takes place in a central cloud – quickly set up and quickly changed if products or the market demand changes,” explained Notbauer. This trend is called ‘access as a service’. However, despite machine learning and 5G - EVVA will continue to drive forward innovations in mechanical locking systems, in addition to the benefits of new Technologies as there is still a mechanical element at the end of the chain.
While Cobalt robots have been patrolling the hallways at Slack offices for some time now, the recent trip to Chicago for GSX came with some exciting news about the next phase of the company’s relationship with Slack. The company’s new integration with this industry-leading enterprise collaboration platform will help keep safety and security a priority for you and your entire office. “Slack is one of the most ubiquitous communications platforms among modern enterprises, and we see this integration as a way to bridge your digital and physical offices. The ability to communicate issues through Slack allows our Cobalt Security Service to create a more effective, productive working environment for both security and facilities management teams and the employees they serve. Real-time collaboration and issues management are key factors in mitigating risks for a more safe and secure workplace, and we’re excited to work with Slack to bring this integration to life,” said Cobalt CTO and co-founder Erik Schluntz. Safe and secure in times of emergency Accidents and threats to safety and security in a business setting can occur at a moment’s notice—with the Cobalt and Slack integration, workplaces are armed with another tool to keep employees alert, safe and secure in times of emergency. With this in mind, we’re proud to announce the launch of a new public alert integration for enterprises to identify and notify employees of safety risks as well as mitigate issues in the workplace in real-time. This integration brings all of a company’s security assets onto a real-time visibility dashboard and communication service Slack’s VP of Global Workplace and Real Estate, Deano Roberts, said, “With this new integration, security teams add the Cobalt Security Service to a shared channel within a corporate Slack workspace. Anomalies identified by Cobalt needing further analysis or review from the company populate the channel in real-time, extending the visibility of the Cobalt Dashboard into a collaborative space.” Real-time alert When Cobalt detects anything that needs escalation or further review—from an unauthorized visitor to CO emissions to a water leak—it triggers a real-time alert in a designated Slack channel. Cobalt follows all company post orders to determine which anomalies and detected events require escalation and review. If the event requires further discussion or action, companies can create new temporary channels in a workspace from the alert. Onsite security personnel can use the new channel to collaborate with each other and with the Cobalt Specialist Command Center to determine courses of action, including potential new patrol paths or public announcements and broadcasts through the robot. In the case of an emergency, such as a fire or carbon monoxide leak, security teams can activate Cobalt’s PA system and siren through the Slack integration and send Cobalt on a new patrol to monitor an evacuation. Real-time visibility dashboard This integration uniquely brings all of a company’s security assets onto a real-time visibility dashboard and communication service. Hardware, software and people — now in one place to help collaboratively monitor issues and mitigate risks onsite or remotely. This is an exciting next step on our journey, and we look forward to helping keep more company workspaces more safe and secure and furthering our mission of using robotics to be maximally helpful to the benefit of all.
In any busy medical facility — surgeries, dental practices or physiotherapy suites — it’s all too easy to accidentally leave a door unlocked. With expensive equipment or controlled drugs on the other side, any opening invites an opportunist. But if a customer installs a Code Handle electronic PIN lock, they need never worry again. The secure, easy-to-fit Code Handle fits right over an existing locking cylinder. The user can simply swap the door handle for a sleek, low-profile Code Handle, and fix it in place with two screws, to instantly add PIN security to any consultation room, medicine store or equipment cupboard. With Code Handle, there is no wiring and no expensive access control to fit. Two standard batteries (CR2) slot inside the handle, typically lasting 30,000 lock/unlock cycles before replacement. The Code Handle comes with a master code and 9 different user PINs — it’s that simple to free staff from the inconvenience of carrying or keeping track of mechanical keys. PINs are easy to set and change whenever an office manager decides. Staff won’t need any specialist or outside help to manage your Code Handle doors. Extra level of security The Code Handle integrated PIN keypad is equally easy for users. Anyone authorized enters their 4-digit code on the handle to unlock the door. Doctors, nurses and other professionals, as well as admin staff, practice managers, security guards and cleaning teams, come and go with their own PINs. For added security and peace of mind, a Code Handle locks itself when the door closes. Now a user can be sure nobody has seen the confidential patient file on their desk or entered the drug cupboard without permission. Code Handle rooms In any healthcare facility, not all staff should have access to every room. People don’t want just anyone walking in on their consultation. Doctors and patients expect privacy. With Code Handle rooms remain confidential. Where would the controlled drugs or hazardous waste bins be kept? Fit a Code Handle so as to no longer need to track a physical key or get the lock changed when it goes missing. And many treatment and examination rooms house expensive or dangerous equipment, including X-ray machines, dental tools and specialist physiotherapy kit. With Code Handle, all this gets the extra level of security it deserves — without the expense of fitting access control.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Use of iTrak solution by casino operators in both Macau and Las Vegas for reporting, security and loss prevention expands Omnigo’s global footprint. Omnigo’s security system “One of the major benefits of penetrating a market like Macau with Omnigo’s security system is that casinos can draw from a shared database of banned patrons, advantaged players, and VIP guests from Day One of implementation,” said Mark Kornegay, CRO of Omnigo Software. He adds, “Sharing data across properties enhances security and surveillance for everyone by allowing casino operators to exchange critical information with each other and with law enforcement.” Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting iTrak security solution Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting and data analysis. Casinos can function more efficiently using iTrak thanks to its simplified reporting and notification process. The system also empowers casino employees to leverage data-driven security intelligence to address incidents in real-time, track persons of interest and mitigate risk and exposure to liability. Various modules within iTrak include Facial Recognition, Visitor Management, Lost and Found and more. Security and risk management system In addition to the Macau expansion, Omnigo’s casino portfolio also includes 100% of the Las Vegas Strip casinos and 65% of the Canadian gaming market. Each casino uses iTrak, Omnigo’s security and risk management system for incident reporting, property surveillance and security and loss prevention. “It’s a true testimony that these casino operators have put their full confidence into Omnigo’s offerings to keep their properties safe. With that level of trust, we’re able to prioritize innovation and bring the latest technology like facial recognition software and advanced data analytics to market faster for our customers, both large and small,” Kornegay added.
The experience of high-quality, high-performance automotive engineering and the sleek lines and signature beauty of luxury auto brands like Porsche, BMW, Mercedes, and more are investments worth protecting. When damage to these vehicles occurs and body work is required, only the work of attentive, highly trained, and craftsman technicians owners can trust, will do. Phoenix-area Autobahn Collision serves the region’s owners of luxury European automobiles with precisely such expertise they can trust, and when the time came to upgrade the premier body shop’s security infrastructure, they looked for a surveillance solution able to meet the same high standards of performance they meet every day. Seamless Integration Autobahn Collision provides customers with a service and repair experience, well-crafted to be as high-end, responsive, and trustworthy as the luxury vehicles they work on. The body shop’s expectations were no less for their surveillance solution, which needed to seamlessly integrate new and existing technologies in a way that was both easy to use and maintain, allowing for monitoring and documentation, as needed, without distracting from the team members core priority: optimising customer experiences and quality body work for their customers.Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution DirectIP NVR Surveillance Solution Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution with IDIS DirectIP network video recorders (NVRs) at the heart, addressing all issues of compatibility and operational concerns. IDIS NVRs, specifically designed to reduce (if not eliminate) compatibility issues, support multiple industry standards and 3rd party protocols. At Autobahn Collision, SARC integrated multiple IDIS DR-8364(F) NVRs in designing a user-friendly surveillance solution that enhanced and fully supporting the shop’s existing IP camera infrastructure. IDIS DR-8364(F) series of NVRs The IDIS DR-8364(F) series of NVRs have multiple features that enhance the overall ease-of-use and maintainability. The DR-8364(F) supports 64 IP channels of 4K UHD with a maximum incoming throughput of 900Mbps, which means fewer NVRs are needed to support a large installation of cameras. Fewer devices reduce the overall complexity of any solution, by definition, and mean less time spent on installation and maintenance. The intuitive DR-8364(F) NVR interface, common to all IDIS products, also means that training and transition investment is minimized. IDIS’s license free software model, which also includes free software updates, further minimizes the cost and complexity of owning and maintaining an IDIS solution. Enhanced protection for luxury vehicles The upgraded solution allows Autobahn Collision and a team of remote monitors to keep the premises—and the concentration of luxury vehicles, parts, and accessories—secure 24 hours a day / 7 days a week, enabled by the enhanced recording, storage, and failover benefits of the IDIS DirectIP NVRs and IDIS’s modular IDIS Solution Suite VMS. Data can be transferred on existing cabling and saved in existing storage space The IDIS DirectIP DR-8364 NVR’s support for H.265 with IDIS Intelligent Codec and Motion Adaptive Transmission (MAT) reduces the need for additional bandwidth and storage upgrades, providing up to a 90% reduction in both bandwidth and storage utilization. IDIS SmartFailover Additional data can be transferred on existing cabling and saved in existing storage space. Multi-layered data protection through IDIS SmartFailover features include RAID 5 storage redundancy, dual power supply redundancy, and NVR failover, which provides support for a standby NVR that continually monitors the primary NVR (taking over recording if the primary hardware fails). IDIS SmartFailover ensures that data integrity and system operation are automatically monitored and maintained, simplifying system support and maintenance tasks. Real-time monitoring, playback and review, high-quality imagery for reference and documentation purposes, and more are now seamlessly empowered by the new system, allowing Autobahn to continue doing what it does best of all, meeting and exceeding the needs of the region’s most discerning vehicle owners.
Universities push traditional access control to its limits. The more one asks of it, the tougher it gets. If one wants to monitor access all over campus. To know who comes and goes to computer rooms and classrooms. One would like to filter access to conference and seminar rooms according to the time — lecturers all day, cleaners and contractors after hours. Meanwhile, one wants students to be safe 24/7, without compromising the sense of freedom they enjoy on campus. Traditional electronic door security Our Aperio wireless locks integrate seamlessly with more than 100 different security systems" Mechanical lock-and-key security cannot do this. Managing keys weighs facilities staff down. Students lose them all the time, and they’re expensive and laborious to replace. The traditional solution — wired doors with card readers — is costly to fit and run. There is an alternative. “Battery-powered electronic locks with inbuilt RFID readers are a cost-effective way to upgrade existing access control and bring it to more doors,” says Lars Angelin, Business Development Manager for Wireless Locks at ASSA ABLOY Opening Solutions EMEA. “Our Aperio wireless locks integrate seamlessly with more than 100 different security systems. You don’t even need to change your smart-cards. They fit all kinds of doors.” “And because they are battery-powered and wire-free, they’re much more cost-effective to install and run than traditional electronic door security.” It sounds great in theory. But what about the real world? These 5 universities have experienced an impact already. University of Liverpool, England A BREEAM sustainability rating of ‘Excellent’ was reward for innovative architecture that combines aesthetics with environmental awareness. Vine Court’s sustainable features include rainwater harvesting, solar water heating and battery-powered Aperio wireless electronic locks. Unlike wired access control, Aperio wireless locks use little electricity. Catherine Anderson at the University of Liverpool called Vice Court ‘a new and exciting benchmark for the Student Accommodation Sector.’ Lund University Faculty of Law, Sweden Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door The Law Faculty wanted to replace their access system without asking 50,000 students and staff to return existing smart-cards for reprogramming. Aperio made the process almost invisible from a user perspective. They didn’t even need to revalidate at a reader. Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door. A Pacom Unison security platform handles everything seamlessly. Facilities staff spends less time on admin and more on security. Aberdeen University, Scotland At Aberdeen’s refurbished Student Village, Aperio online cylinders and certified security locks cover doors requiring different grades of security. Cost efficiencies came at installation stage — no cabling to the doors means no expensive electrical contractors — and will continue through the locks’ operational life. Unlike standard wired access control that requires ‘always-on’ mains electricity, Aperio wireless locks are powered by batteries. These typically need replacing every couple of years — and that’s it for maintenance. HafenCity University Hamburg, Germany Aperio electronic cylinders filter access to the media centre, library, cafeteria and offices A partnership between SIEMENS and ASSA ABLOY provides intelligent, transparent electronic access control at a new docklands hub for the university. Aperio electronic cylinders filter access to the media centre, library, cafeteria, seminar rooms, staff rooms, laboratories and offices. Locking with these wireless RFID devices enables the university to remain an open, welcoming space without sacrificing staff and student safety. University of Birmingham, England Two new accommodation blocks at the university’s Vale Village complex needed locks to integrate seamlessly with a pre-existing campus security system, including Gallagher Command Centre software. Aperio locks now secure almost 1,800 doors with a low-cost solution that eases the key management workload for facilities staff. Everything is controlled from the Gallagher interface. And because Aperio is scalable, they can add new doors and buildings whenever they choose.
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the center also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project. Providing comprehensive coverage All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS). All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback. Automatic object detection The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach. Each camera is set to perform virtual guard tours at specific times throughout the day and night IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognize and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role. Access to advanced features and functionality Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient. The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralized control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site. Authorized monitoring and access of footage IDIS technology made this easy, and it was also the quickest and least disruptive to install Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents. Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorized monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO). Ensuring better safety and security Replacing the centre’s aging camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events. Exterior cameras ensure better safety and security in outdoor communal areas Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter. Access and review recordings "A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust. With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
TCIEXPRESS, a customer-oriented, multi-technology transport system in the Indian and International markets, has announced using Matrix Time-Attendance solution for increasing productivity and streamlining salary processing. This high-tech transport system pursuit value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world. TCIEXPRESS multi-technology transport system TCIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts and leave policies for the various locations and numerous workers at a central place was a very tedious task for them. Moreover, this leads to complex computation for salary based on the absent-present report. So, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. Ultimately, they were facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for Time-Attendance and payment process. Matrix offered COSEC VYOM for people mobility management for TCIEXPRESS's 3000 employees at 500 locations COSEC VYOM cloud-based system After a comprehensive discussion regarding problems and requirements, Matrix has offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based Time-Attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix Time-Attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS. COSEC VYOM cloud-enabled Time-Attendance system provides the following results - Quick salary processing Improves productivity Reduce paperwork Secure and on-demand network access Eliminates server cost, infrastructure cost, and maintenance cost Products Offered: COSEC DOOR FOT
STANLEY Security, one of the UK’s renowned security providers, has completed a major CCTV installation for Bridgnorth Aluminum Limited, the UK's only manufacturer of aluminum flat rolled products. At 27 hectares, Bridgnorth Aluminum’s site in Bridgnorth, Shropshire is extensive. It is home to a casthouse, rolling mill, two litho centers, a multi-slitting line and finishing lines. IP CCTV system The IP CCTV system is critical to our business in terms of health and safety of our employees and site security" The company had previously been using three separate CCTV systems, each covering different parts of this large site, one of which was over 15 years old, had very poor image quality and was starting to show signs of failure. Furthermore, none of the CCTV systems had any level of redundancy, so if one failed access to those particular cameras were lost, along with any recorded footage. Steve Denton, IT Manager at Bridgnorth Aluminum, explains the decision to upgrade, stating “We needed to consolidate everything into one single CCTV system, including all of the cameras from the other three systems, and we needed to add a level of redundancy. The IP CCTV system is critical to our business in terms of health and safety of our employees and site security.” IP video surveillance Following detailed discussions with Bridgnorth Aluminum, STANLEY Security designed a new site wide IP based CCTV system, covering external areas and the perimeter of the site, along with internal areas including key indoor production spaces. The system takes advantage of Bridgnorth Aluminum’s existing IP network which is deployed in most areas of the site, negating the need to install COAX cable. Opting for an IP-based CCTV system has also enabled Bridgnorth Aluminum to make use of newer technology with better quality images, which was the key. STANLEY 2MP bullet cameras and dome cameras The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms The new IP CCTV system features STANLEY 2MP bullet cameras and dome cameras, including 360⁰ dome models. The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms; one of which is used in case of redundancy. Bridgnorth Aluminum is pleased with the new CCTV system as Steve Denton comments, “The image quality of the new system is streets ahead of the old system. The area of coverage is also far greater thanks to the addition of 180-degree wide angle and 360-degree cameras. The software is very easy to use and has some very useful features to aid with playback of recorded footage. The software has already helped us to retrieve footage that we would have had little chance of retrieving before.” Enhanced site security STANLEY Security has been working with Bridgnorth Aluminum since 2017 when it took over the support of the company’s existing CCTV systems. “The transition period had proved successful” states Steve, commenting on their decision to appoint STANLEY Security for this project. He adds, “The service from STANLEY has been excellent, our account manager Amber is one of a kind and always goes above and beyond for us to ensure that we receive the best service possible.”
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?