Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secu...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced its new partnership with DVS Ltd., a security solutions distributor in the United Kingdom. Suprema – DVS partnership DVS is a well-established distributor of video surveillance products in the UK. By becoming DVS’s first dedicated access control and biometric partner, Suprema aims to expand its customer base, providing UK customers with comprehensive security soluti...
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction...
Frictionless access control has become a must for many businesses that want to create a hygienic working environment for colleagues and visitors in a COVID-19 affected world. The availability of the Safetrust Touchless Identity solution from Smart R Distribution could not therefore come at a better time. The Safetrust Touchless Identity solution provides the opportunity for existing access control systems operating within airports, offices, education establishments, factories, hospitals, local...
Fingerprint identification had once been the most widespread biometric technology around the world. However, many argue that this technology has quite a lot of shortcomings. For instance, even expensive fingerprint reading scanners have a hard time identifying dirty or wet fingers, plus, some people's fingerprints are unreadable. Furthermore, being vulnerable to the temperature and precipitation, such scanners consequently cannot be used outdoors. Plus, fingerprint reading scanners do not meet...
HID Global, the globally renowned provider of trusted identity solutions, has announced that its next-generation Seos credential technology will enable Nymi Band 3.0 users to seamlessly open doors and authenticate to systems, devices and machines. Nymi Band 3.0 wearble wristband The Nymi Band is the world’s only workplace wearable wristband that, once authenticated, offers the convenience of continuously authenticating the identity of the user until it’s removed from the wrist. Thi...
Master Lock, the American security super brand, is excited to announce the launch of the Biometric Security Safe to join the brand’s expanding easy access range. Following the success of the Biometric Padlock that launched earlier in 2020, the new Biometric Security Safe offers a practical solution to security at the touch of a fingerprint! The Biometric Security Safe is the ideal home and office solution for protecting precious valuables and electronics against theft. The biometric lock allows users to store up to 30 fingerprints there is no need to memorize tricky combinations or codes. Protection against attacks There is also no danger of keys getting into the wrong hands or becoming lost. The security mechanism comprises of two steel motorized bolts and a concealed hinge for increased protection against attacks and prying attempts. The body of the Biometric Security Safe consists of a solid steel construction for a robust outer layer. The interior features a carpeted floor to prevent the contents from scratches during storage and a handy interior light for added visibility in the dark or low light. Additionally, since the Biometric Security Safe does away with fiddly keys, it is a great security option for those that suffer with joint pains as gaining access does not require any uncomfortable twisting. It is also useful for the more forgetful who might misplace keys or misremember codes as all that is required is a fingerprint. Integrated battery jump kit The safe requires 4 AA alkaline batteries to operate which are easily accessible and replaceable Thanks to an integrated battery jump kit and set of two override keys, users can rest safe in the knowledge that they can always have access to the safe, even in the event of flat batteries. The safe requires 4 AA alkaline batteries to operate which are easily accessible and replaceable. Boasting a large interior 25.4 liters capacity, the Biometric Security Safe is suitable for storing a wide range of precious items and electronics such as passports, cheque books, small electronics like cameras, tablets, laptops and important A4 sized documents. The neat size makes it ideal to integrate into a variety of existing pieces of furniture such as wardrobes, desks and cupboards making the safe easy to conceal from sight. Master Lock’s 90-plus years of security expertise means users can rely on a product that has been perfected and designed from the ground up by a team of dedicated security professionals at the brand’s headquarters in Wisconsin, USA.
Matrix is gearing up for participation in the 2nd Edition of, IFSEC Virtual Expo 2020 to be held on 17 and 18 September 2020. Matrix will be launching its latest Time-Attendance and Access Control device COSEC ARGO FR along with its People Mobility Management and Video Surveillance solutions. Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of the solutions is specifically designed for large, multi-location enterprises, SME and SMB organizations. Matrix continuously works towards keeping abreast of the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Security and Telecom solutions at the Virtual event. Event Highlight ARGO FR is a performance, design, and engineering wonder, equipped with an enhanced IPS LCD touchscreen At IFSEC Virtual Expo, they will be launching COSEC ARGO FR. It supports multiple contactless credentials such as face, smart cards, PIN, cellphone using BLE. ARGO FR is a performance, design, and engineering wonder, equipped with an enhanced IPS LCD touchscreen for a visually splendid experience. The addition of Gorilla glass calls for enhanced toughness. This device has higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity. It is specifically designed for serious Time-Attendance and Access Control applications. This device offers connectivity options like Bluetooth, Wi-Fi, PoE, and USB. Furthermore, IP65 and IK08 certifications make it suitable for challenging and outdoor installations. Temperature Screening Matrix’s solution experts will be demonstrating the touchless and auto temperature measurement solution In the wake of a pandemic, organizations are forced to navigate some attention on safety and hygiene. So, Matrix’s solution experts will be demonstrating the touchless and auto temperature measurement solution, User Temperature Screening. This eliminates the manual temperature reading process and replaces it with an advanced and much safer one. This setup notifies the authorities in case of exceptions. The other thing which is going to be shown in this exhibition is Time-Attendance and Access Control with contactless credentials. At IFSEC Virtual Expo, Matrix would be demonstrating their product range from the SATATYA family of security solutions which involves the 8MP Project Series Bullet Camera, SATATYA Network Video Recorders and SATATYA SAMAS. Bullet Camera The 8MP Project Series Bullet Camera is designed to meet the needs of large organizations To begin with, the 8MP Project Series Bullet Camera is designed to meet the needs of large organizations and demanding project applications. Powered by smart processors with Deep Learning Algorithms these IP cameras are an example of superior image quality and performance. To emphasize on the image quality, the cameras are equipped with SONY STARVIS back-illuminated sensors which give exceptional image quality in low lighting conditions. Besides this, the 4K cameras are equipped with intelligent video and audio analytics like motion detection, intrusion detection, tripwire, gunshot detection, scream detection and many more. Also, they are robust devices that can be installed in all kinds of environments. Network Video Recorders SATATYA Network Video Recorders are designed for serious video surveillance deployments To add to this, the SATATYA Network Video Recorders are high performance, power-packed workhorses which are designed for serious video surveillance deployments. In addition to high-resolution recording and live view of multiple streams, they offer innovative cascading, powerful investigators and instant notifications. Not to miss, the device has a 512Mbps throughput capacity with 4K Decoding. All in all, these flexible and reliable NVRs are ideal for modern organizations looking for proficient, persistent and preventive security. Lastly, the string that binds the video surveillance solutions and the devices together, SATATYA SAMAS is the solution that is designed to combat the security needs of modern organizations. Designed on pillars like optimizing cost and providing proactive security the solution is one's one-stop solution for diverse security needs. Intelligent video analytics Not to forget, the solution gives real-time security with the help of intelligent video analytics like Missing Object Detection, Motion Detection, No Motion Detection, etc. Apart from this, it can be integrated with other third-party security systems like Access Control, Fire Alarm, Parking Management System, etc. “IFSEC Virtual Expo is South Asia’s largest security, civil protection and fire safety show, which in turn provides us with a platform to expand our ties with industry experts and system integrators. The event also serves as a great stage for highlighting our well-engineered solutions. We aim to use this opportunity to expand our network and spread word about our technologically advanced Security solutions”, Kaushal Kadakia, Marketing Manager Matrix Comsec.
ASSA ABLOY announced the introduction of Medeco’s Intelligent Key Cabinet (IKC), a complete key access control and storage solution. Ideal for keys and other assets that require a high level of security and accountability, the IKC is an electronically controlled steel cabinet that requires Biometric Fingerprint, PIN, or Prox Card authentication (optional) for access. Authorized users have access to only specific keys stored in the cabinet. The IKC electronically keeps a record of key removals and returns, by whom and when. IKC is also an essential addition to the Medeco XT Intelligent Key system: it can simultaneously secure and charge Medeco XT electronic keys, ensuring they are always ready for use. For optimum efficiency, an optional add-on programming device allows updates of schedules and access rights to XT keys while they are secured in place. Key management system The IKC secures mechanical keys and assets using exclusive iFob technology “Any key system is only as secure as access to the keys themselves,” said Gene Cronin, Medeco Product Manager, ASSA ABLOY. “With the IKC, facilities can not only control access to keys, but track when keys are removed and returned. Imagine no more chasing down keys - always know who took a key and when. It can even capture a photo of the person removing the key." "Add the convenience of charging and programming XT Intelligent Keys, and it’s plain to see that no other key management system offers the efficiency and accountability of the IKC.” Secure mechanical keys The IKC secures mechanical keys and assets using exclusive iFob technology. XT Keys are secured using a locking XT charging port. Designed for maximum scalability, Medeco’s IKC is available in 32 or 64 port sizes. 32 port cabinets can be configured to store either all XT or all iFob ports. 64 port cabinets can be all XT, all iFob, or a combination of 32 XT plus 32 iFob. The IKC system can grow as business needs grow by adding on additional secondary cabinets in either 32 or 64 port sizes and in a combination of technologies (iFob or XT). Features: Available in 32 and 64 port sizes Available in main and add-on configurations XT and iFob versions Securely stores and charges XT keys (XT version) Identifies XT key serial number (XT version) Fingerprint reader Built-in LCD screen for ID Supports 2 factor authentication Audible and visual alarms SMS messages Email messages Camera for security photo capture Comprehensive Reporting & Analytics Emergency Fob Release System (optional) Wall mount or optional stand
While access control is a fundamental element of security in higher education, many aging access control systems urgently need to be upgraded. This is according to a survey of 1,800 higher education security and IT professionals conducted by Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions and HID Global, a worldwide provider in trusted identity solutions. While organizations are ready to embrace new technology, they are looking to go “beyond the door” and integrate with other security and operations systems. Older technologies The survey shows that 33.76% of readers, 30.6% of controllers, and 24% of software are more than six years old. Older technologies such as barcode, magnetic stripe (mag stripe) and 125khz low-frequency proximity (prox) continue to dominate physical access control systems in higher education. More than half of survey respondents still use mag stripe, and almost a quarter still use 125khz prox. 64% of survey respondents said their current access control system experiences malfunctions. However, more than a third of survey respondents (35%) are ready to embrace more modern technology as a way of improving the experience for students, faculty, and administrators. Access control for multiple applications Over half of respondents (54.2%) would be interested in using their access control credentials to support multiple applications beyond physical access, and 44% stated that better integration with other security systems/components is a key driver to upgrade their access control systems. Most colleges and universities want their students to use a single card or cellphone credentials for multiple types of applications from accessing dormitory rooms and checking out books from the library to locking bicycles and paying for food, parking, and more. However, 64% of survey participants said while they want to upgrade their systems, they view costs as an obstacle. This often leads institutions to ultimately migrate to systems that fulfill minimum requirements because of cost, rather than seek the features and integration capabilities they seek. Unified video and access control solution “There are new technology options that can make life easier for administrators as well as those who use the systems,” says Jason Friedberg, Commercial Head, Education at Genetec. “With ever-evolving threats, and a need for increased efficiency, accessibility and privacy, security on higher education campuses is an ever-changing environment. Institutions need to be prepared for these changes by upgrading to a unified video and access control solution that is flexible, connected, and easy to use.” “And while cost is seen as an obstacle, the true value is often not factored in. With a modern, unified system, ongoing costs often end up being lower than those of legacy systems because the additional capabilities of newer systems increase operational efficiencies across multiple departments,” concluded Friedberg.
ONVIF®, the global standardization initiative for IP-based physical security products, publishes the Release Candidate for Profile D, a draft specification that covers interfaces for access control peripherals. This newest profile candidate is designed to provide ONVIF interoperability for peripheral devices such as locks, credential/biometric readers, PIN pads, license plate recognition cameras, door phones, sensors and displays. Access control systems “Profile D, together with access management profiles like ONVIF Profile A and C, and video profiles like ONVIF Profile T, will help users build modern and secure IP-based access control systems,” said Patrik Björling, Chair of the ONVIF Profile D Working Group. “It will allow for the integration of products from different manufacturers and help further drive the adoption of ONVIF interfaces in the physical access control and video surveillance space.” A peripheral device can pass credential identifiers to a securely located Profile D conformant client Using Profile D, a peripheral device can pass credential identifiers to a securely located Profile D conformant client, such as an access control unit or management software. The client or controller, which stores access rules, schedules and credentials, can then take the access decision and send a command back to the peripheral device to grant or deny access, display a message or request additional input such as a PIN code. Blocked credential identifiers Having sensitive information on a separate controller in a secured area enhances security. Communications between the device and client are secured using ONVIF security protocols such as TLS. The Profile D specification enables a conformant client to configure a conformant device with the necessary data such as which door and access point the device is responsible for, as well as configure a list of allowed or blocked credential identifiers in a device that supports this capability. The need for standardized interfaces between access control management systems and peripheral devices is driven by innovative identification technologies such as license plate recognition cameras for parking management, bar code reading cameras for visitor management, wireless locks and sensors for access control, and video door stations for intercom management. Enabling standardized communications Such devices include a door phone that combines a reader and lock with audio/video intercom ONVIF Profile D complements Profile A and Profile C in enabling standardized communications in an IP-based electronic access control system. Profile D devices can also support video profiles such as Profile T to enable an integrated video and access control system using ONVIF interfaces. Such devices include a door phone that combines a reader and lock with audio/video intercom, or an IP camera with a relay output connected to a lock that can be used by a guard to visually identify a visitor and remotely unlock the door. Advanced video streaming Founded in 2008, ONVIF is a well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and nearly 19,000 profile conformant products. ONVIF offers Profile S for streaming video; Profile G for video recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality, Profile A for broader access control configuration, and Profile T for advanced video streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.
StoneLock, a pioneer in designing and manufacturing of contactless and privacy-hardened biometrics solutions, announces the official product launch of the StoneLock® GO biometric reader, a next generation biometric reader redefining security and authentication of users for physical access control. It is now available for purchase by enterprises of all sizes. Launching at a pivotal time for access control in light of a growing demand for contactless and privacy-grounded technology, the StoneLock® GO iz intentionally designed with proprietary, ’faceless’ recognition technology to protect users by safeguarding their privacy without the use of photographs while eliminating the need to touch. Utilizing contactless technology While an access card or password can be misplaced, shared, or cloned, the inherent properties used to authenticate users through StoneLock ensure that the only people accessing a building or room are the ones who have been granted permission. “The StoneLock GO is a revolutionary biometric edge reader designed to address our customers' needs for a secure, easy to use and utterly private access control solution,” said CEO and Co-Founder Colleen Dunlap. Rounding out our complete biometric-centric access control solution when coupled with the StoneLock Gateway" “Rounding out our complete biometric-centric access control solution when coupled with the StoneLock Gateway, the StoneLock GO takes a significant leap forward by delivering exactly what enterprises need to secure their buildings, protect user privacy and deliver a completely contactless and simplified experience. We are proud to now have it in the hands of our customers at a time when protecting user privacy and utilizing contactless technology is of paramount importance.” Seamless movement of biometric templates Product features include: Simplified Enrolment: Utilizing a QR code or a card swipe, the StoneLock interface delivers an easy to read display that will guide users through a simple and touchless self enrolment process. Near-Infrared Technology: Using state-of-the-art near-infrared sensors, StoneLock’s readers scan and store unique templates of enrolled users that are unrecognizable outside of the StoneLock system, while making it universally compatible with all users regardless of gender, race, age or nationality. IdentityCare: The StoneLock proprietary algorithm replaces an enrolled user’s face with a mathematical representation, eliminating the need of photographs or storing images. Enterprise Ready: The third generation of the StoneLock Gateway provides a complete biometric-centric credentialing and user management solution that supports a highly, available, fully secured, seamless movement of biometric templates between StoneLock GO readers. Ease of Use: Combining security, speed and accuracy, the StoneLock GO reader is built with a user-friendly, simplified operational interface for the ultimate ease in deployment, enrolment, operation and management.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
Sharps Pixley is a British bullion house, formed in 1957 when two historic private bullion partnerships merged. In 2015 Sharps Pixley decided to put physical gold back on the streets of London via a flagship high street presence in St James’s Street, just off Piccadilly. In this very special shop, not only can customers buy products but they can also store them on-location in new, state-of-the-art safe deposit box facilities. Sharps Pixley needed to upgrade their ageing control system for their safe deposit box service. Old biometric system They were facing a number of challenges with their old biometric system which was substantially impacting customer experience and satisfaction: Capturing fingerprints during the enrollment phase, especially with older clients, would typically take several attempts. During the verification process, the shop operator faced similar issues thus requiring multiple system restarts to get the device working correctly. The software was unstable and would often crash. New additional functionalities were also required to be able to offer the correct secure services to the clients: Two person authentication to access a single safety deposit box. Manual authentication in addition to biometric identification. Replacing the key fob with a biometric solution. Access control technology Arana Security was contracted to help. Operating in the UK and Middle East, Arana Security specialises in biometric solutions, access control technology, surveillance and monitoring systems. They set about to design a new application for Sharps Pixley, to enhance the security, authentication and usability of the system - adding new next-level security clearance and a fresh and improved enrollment of clients’ biometrics. For the important biometric part, Arana Security and Sharp Pixley selected IDEMIA’s MorphoWave Compact contactless fingerprint device to enable fast, smooth and accurate verification of clients. MorphoWave Compact performs a 3D scan and verification of four fingerprints in less than one second, in a quick, easy and hygienic touchless hand wave gesture. Thanks to advanced algorithms based on Artificial Intelligence, the accuracy is very high, even with ageing fingers. Contactless biometric devices The system provided has improved the client’s service and provided a more robust, secure and reliable solution The implementation of MorphoWave Compact contactless biometric devices meant less time wasted at the desk waiting for confirmation of IDs and less stress on both the clients and employees. The system provided has significantly improved the client’s service and provided a more robust, secure and reliable solution. Sharps Pixley’s comments: “We approached the Arana team with a particularly unique set of problems to resolve including a security system that used hardware and software originally designed for a totally different purpose. I knew what I wanted but was not sure if it was possible. I was essentially an explorer deep in the jungle with a perfect map in my own head, but with no tools or machinery to hack my way out." Provides palpable reassurance "Arana did more than just clear a path for me to get to my destination - they paved the road for me afterwards. MorphoWave Compact device from IDEMIA is the icing on the cake that makes this all possible. Used properly it is refreshingly simple and intuitive. The team here and our clientele no longer struggle to manage or use our access system. The device itself provides palpable reassurance in the technology and that has true value”, says Bruno Garcia, Sharps Pixley.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fueled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralized access control systems Almabani General Contractors was using traditional decentralized access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognized in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralized, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customized reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralized solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customized with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralized time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
Václav Havel Airport Prague (PRG), with its prime location in the Center of Europe, is the largest and most important international airport in the Czech Republic. Prague Airport handled 17.8 million passengers in 2019 and received the Airport Service Quality Award 2019 awarded by ACI1 for the second time in a row. At Prague Airport, there are different types of areas restricted to authorized personnel. These are governed by an access control system fitted with approximately 1,000 readers and over 1,500 secured points (doors, locks, etc.). Mifare Desfire cards are predominantly in use for the time being. Among these, Security Restricted Areas (SRAs) are the highest security areas, with 60 access points of high importance. Contactless biometric technology Due to the critical nature of those areas, Prague Airport needed a very high level of security, and decided to implement a biometric solution, as the card itself (including with the use of a PIN code), would not be deemed as secure enough. The biometric system had to be able to cope with over 20,000 individuals, with the capability to increase to up to 30,000 users in the future. Prague Airport decided to keep the existing access cards but to add a biometric verification level for the SRAs. This means that the biometric solution would have to be used in combination with the existing cards through a two-step process. In order to avoid any physical contact with the devices, for user convenience as well as for hygienic considerations, it was decided to deploy a contactless biometric technology. Access control system The readers were installed at existing control points and are fully integrated into the airport access control system Prague Airport tested two technologies capable of connecting to its access control system, among which IDEMIA’s MorphoWave Compact contactless fingerprint terminal. After a thorough testing period, the choice was to go for IDEMIA’s technology for a number of reasons including: great user experience with an easy and quick hand gesture, as well as a strict GDPR compliance with users’ biometric information stored only in their cards. Prague Airport deployed more than 60 MorphoWave Compact in its SRAs. The readers were installed at existing control points and are fully integrated into the airport access control system. More than 20,000 users now have their biometric data in their access cards and the system is fully operational. Embedded card reader IDEMIA’s seamless biometric technology helps address health and safety issues. Employees appreciate the user experience provided by the solution deployed: it is easy to tap the access card onto the embedded card reader situated at the top of the reader and then to just wave the hand in a quick simple movement to get 4 fingerprint verified in less than 1 second, without the need to touch any part of the device. Airports is a key vertical among the many different ones served by IDEMIA. The biometric devices are used by 35+ of them throughout the world for staff access control, as here in Prague. The company’s biometric solutions are also used for border control and passenger flow facilitation, in more than 30 different airports.
JEWISH CARE has placed its trust in the latest access control, door entry and CCTV technology, to help create a safe and secure environment for residents living in Anita Dorfman House, a new 64-bed care home facility recently erected at its Sandringham care and community hub in Stanmore. Phase 1 of the project has seen the MEPH contractor Harvey Group, award a contract to South London system integrator WLS, to install a Paxton Net2 access control and door entry system with the objective of ensuring that JEWISH CARE has strict control as to who is able to enter the accommodation block or gain access to its sensitive areas. Home management control Paxton proximity card readers and door entry panels have been installed at the new care home’s 5 entrances which, together with 55 door entry handsets deployed throughout the building, allow JEWISH CARE reception and security personnel monitor all access control events. They are able to do so with the help of Paxton’s user-friendly Net2 software platform run on a desktop PC. WLS has also installed over 60 high definition 4-megapixel network dome cameras manufactured by Dahua at carefully chosen locations both within and around the building, to help detect intruders, as well as visually verify access control activity. In addition, automated barriers will shortly be installed at the site’s entrance. Linked to the CCTV system and triggered by Automatic Number Plate Recognition (ANPR) analytics, the barriers help care home management control vehicle access to the site. Smooth implementation of the access control JEWISH CARE is the largest health and social care organization serving the Jewish community in London With over 70 centers and services touching the lives of 10,000 people every week, JEWISH CARE is the largest health and social care organization serving the Jewish community in London and the South East. “We go to great lengths to ensure our clients feel safe and this is particularly important as many of them have disabilities, mental health needs or live with dementia,” said Lindsay Long, Facilities Manager at JEWISH CARE. “Investing in the latest generation of access control, door entry and CCTV solutions was therefore considered to be an essential requirement and we have been delighted with how Harvey Group, WLS and the various manufacturers involved in the project, have worked closely together to ensure a smooth implementation of the access control, door entry and CCTV systems.” Stopping unwanted visitors “The combined solution is enabling us to deter and stop any unwanted visitors from entering the building, as well as track and record people as they move around the building, without causing any inconvenience or disruption to colleagues, clients and genuine visitors.” A second phase of the project which is due to be completed by the end of 2020, will see WLS expand the security systems to cover the care home’s new independent living and communal facilities. As was the case during phase 1, WLS has also been tasked to install a TRIAX satellite TV system throughout new facilities, to enable to clients watch British and Israeli TV.
Rural communities have struggled for a long time to maintain access to quality healthcare services. There is a lack or limited number of clinics in rural areas. Ziqitza Health Care Limited signed to implement "Madhya Pradesh Emergency Medical Ambulance and Healthcare Services" for the government. This mobile clinic would travel in rural areas, covering every small village. These are called Madhya Pradesh Mobile Units (MMU). As the ambulance is on move all the time, attendance capturing of doctors and nurses was a problem. Above that, vibrations from a moving vehicle led to difficulty in installation of an attendance marking device. Furthermore, provision of LAN connection not being possible in a moving vehicle, device connectivity posed as another problem. Moreover, keeping track of 144 ambulances all together with their doctors and nurses was a difficult task for the government of Madhya Pradesh. Real-time data transfer These devices also allow keeping track of each of these ambulances having more than 700 users After comprehensive discussion, Matrix offered flexible and reliable devices and software to the government of Madhya Pradesh for MMU (Madhya Pradesh Mobile Units) in rural areas. Around 144 devices were installed in the ambulance in a way that they could withstand the vibrations of a moving vehicle. Matrix Time-Attendance solution enabled them to capture accurate attendance of doctors and nurses. These devices also allow keeping track of each of these ambulances having more than 700 users. These products have auto push technology which transfers data to the server in real-time. For real-time data transfer, they used a USB data dongle with 3G/4G connectivity. The result was the improved efficiency through real-time attendance data. Products offered COSEC DOOR FOT (144 units) - Fingerprint and card based door controller for Time-Attendance application COSEC CENTRA ME (1 units) - Application Server Platform with 500 users and expandable up to 1,000 users COSEC ME TAM (1 unit) - Time-Attendance Software COSEC USER1OO (3 units) - 100 Users License
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?