Gates & Fencing
Alarm.com has developed the first cellular sensor with virtually no range limitations for monitoring valuable property and assets. The Alarm.com Flex IO™, a battery-powered device that is weatherproofed for outdoor durability, uses the latest LTE-M technology to operate anywhere there is LTE coverage and without a panel, hub or even Wi-Fi. The one-of-a-kind sensor works as a standalone solution or as an expansion of a person’s existing Alarm.com-powered system. The Flex IO™ se...
Camden Door Controls, a premier provider of door activation, control and locking products, is pleased to announce that its 2021 price lists are now available in both U.S. and Canadian editions. The 100+ page books detail all of Camden's offerings, including product overviews, features, specifications and pricing. In addition, the 2021 price lists re available in multiple formats, including printed hardcopy versions and electronic PDF. Printed price lists are also available by contacting Camden&...
Nedap, the foremost specialist in advanced vehicle identification solutions, has upgraded its ANPR Lumo license plate reader for vehicle access control with Open Supervised Device Protocol (OSDP) ensuring greater site security. The ANPR Lumo is one of the world’s first all-in-one license plate recognition systems compatible with the OSDP protocol V.2.1.7. The OSDP upgrade within Nedap’s ANPR Lumo camera makes it possible to improve vehicle gate access in a trusted and secure manner...
ASSA ABLOY Opening Solutions completed the integration of their Aperio wireless lock technology with vIDix Control, a security management system from Ban-Koe Companies, who provides workplace security and workforce management solutions to thousands of organizations worldwide. “Integration with the Aperio locksets provides vIDix Control customers with the ability to extend electronic access to areas of their facility that are typically off limits to a wired solution,” said Steve Lohm...
Senstar, a front-runner in video management and perimeter intrusion detection solutions, is pleased to introduce Alain Grinbaum as Senior Sales Director. Based in Paris, France, Mr. Grinbaum has assumed direct responsibility for Senstar’s sales functions in that country, as well as Italy, Benelux, the United Kingdom, South Africa, and the Middle East. Fulfilling customer needs “Senstar offers complete and sophisticated security solutions on their own and/or in combination to provi...
Buildings or sites with existing or future Nedap access control systems can now benefit from integration with Forge Bluepoint visitor management to give people visiting their space smart, secure and time-limited access. Integration with Forge Bluepoint The new integration was customer-driven by HB Reavis’s new building in Bratislava, Nivy Tower, which went live in November. Wayne Lee, Director at Forge, said “We’re excited about this partnership and being able to offer our c...
Interphone has published a security system and building technology whitepaper to help developers, contractors, installers, and managing agents better understand their responsibilities regarding the General Data Protection Regulation (GDPR). The in-depth report, titled A guide to GDPR compliance for the commercial residential marketplace, has been produced jointly with legal training specialist Woolven and Brown to provide an industry-specific look at the data protection and privacy law. GDPR and Data Protection Act 2018 “Security systems and building technologies now hold personal data in many hidden places, so organizations within the commercial residential marketplace need to know what they can and cannot do in relation to holding this information based on the laws that are in place,” explains Charlotte Woolven-Brown, Managing Director of Woolven and Brown Ltd. “The exact requirements can often be confusing, so this guide is designed to help property professionals understand what the GDPR and the Data Protection Act 2018 are and how they apply to their property businesses.” Product-specific policy requirements The white paper provides an introduction to the GDPR, outlining the main considerations for commercial residential property organizations and the impact it may have on them. The guide also covers product-specific policy requirements for those security systems and building technologies that either hold a lot of data or share data with a third party. This includes CCTV, automatic number plate recognition (ANPR), biometrics, voice recognition, door entry, and access control. Process and manage data “The GDPR and the Data Protection Act 2018 have changed the manner in which we process and manage data. Failure to comply could be extremely damaging in terms of potential fines and the threat of civil action, while adverse publicity risks significant damage to the reputation of an organization.” “The advice to property businesses is clear, understand your responsibilities and get it right from the start,” concludes Woolven-Brown. Seeking clarification Julian Synett, CEO of Interphone Limited commented, “Since the introduction of the GDPR, we have had developers, contractors, installers, and managing agents seeking clarification on their compliance requirements for the security systems and building technology we develop, install and maintain.” “This suggests there is still a lack of clarity about what is needed, so we have created this white paper to help answer many of the GDPR questions that property businesses currently have.”
Airports present a complex challenge to security managers, representing in sharp relief the tension between the need for efficiency and that of maintaining the highest levels of security standards. As the primary passenger travel hubs of the modern era, airports see the most significant amount of traveler traffic as billions pass through their gates annually on their way to their destinations, both domestic and international. This trend of higher rates of air travel shows no signs of letting up any time soon as global demand for air travel continues to be on the rise, hitting an additional 5% of growth by June of 2019. Challenging security managers The challenge for security managers becomes one of how to ensure that all of these travelers are able to move as freely as possible to reach their gate while ensuring that they and the employees who facilitate the operations are all screened for any potential threats to security. Airport security managers are seeking out technologies that can help their teams to do more within their constraints In response, airport security managers are seeking out technologies that can help their teams to do more within their constraints. This article highlights four different technologies that are making their way into airport security managers’ planning as they build out their strategies for the year ahead. Airplanes and airports represent ideal targets for violent actors seeking to carry out well publicized, substantial attacks. Air travel industry Assaults on the airport grounds or attacks on airborne craft with an explosive or other means have the potential to grab headlines, cause massive casualties, harm the air travel industry, and draw significant reactions from authorities. For these reasons and more, the consequences stemming from a successful attack in this space can be severe and leave little room for error. Striking a balance between the two seemingly conflicting requirements is a difficult act, but is achievable when they define the threat models and implement the necessary solutions and strategies to reach the goals. Building a strategy starts with thinking about how to implement inspections before the travelers reach the terminal. In an ideal security situation, all plots to carry out attacks against an airport would have been picked up by intelligence operations long before the perpetrators even reach the grounds of the airfield. Air travel security Intelligence failures happen and one needs to have measures in place to prevent attackers However, intelligence failures happen and one needs to have measures in place to prevent attackers from reaching the terminals where they can carry out their attacks, potentially causing significant losses of life. The June 2016 attack on Istanbul’s Ataturk Airport that killed 41 people and left more than 230 injured was a stark reminder that attackers do not even have to pass through terminal security in order to pose a threat to air travel security. Controlling access to the terminals with a defined checkpoint at the entrance to the grounds can be a good start for defending your airport. It is advisable to offer a multi-lane checkpoint which compels the incoming traffic to slow for an inspection that allows security officers to perform a quick visual inspection of the vehicle and its passengers, asking them a question or two to ascertain whether they require additional checks depending on whether they show suspicious behavior. Vehicle inspection technologies As the vehicles cross through the checkpoint, interacting with personnel who look into the vehicle’s interior, there is an opportunity to also scan the undercarriage of the vehicle for additional threats such as explosives or other weapons which might be hidden below. Under vehicle inspection technologies (UVIS) that utilize high-resolution cameras to capture images for deep learning analysis allow security teams to scan and detect potential threats in a matter of seconds. Advanced systems in this market use anomaly detection to identify suspicious items based on their deep understanding of the various elements that make up the vehicle (i.e. the exhaust pipe, brake lines, etc.), and can alert security teams to the need for additional checks if it finds something that is out of place. Compromising security requirements The UVIS technology gives airports the ability to move vehicles through the checkpoint quickly These high-end solutions do not require previous scans of the vehicle or a manufacturer’s model, giving it a ‘first pass’ capability that is essential for airports that deal with new traffic on a regular basis. They also offer comparison technology which can play an important role for dealing with insider threats, which will be covered in our next post. The UVIS technology gives airports the ability to move vehicles through the checkpoint quickly, only flagging those that raise red flags for more intensive scans, thus minimizing the time spent stuck waiting for inspections without compromising on security requirements. Once the travelers reach the terminal and check in, they are ready for the next stage of the security inspections before reaching the gate hall. Often categorized by long lines and fraught nerves, this security check is ripe for a shake-up. Traditional security line An upgrade to the traditional security line, Automated Screening Lanes (ASL) systems offer a number of advantages. First, instead of a single line trudging along waiting to advance, travelers need only to find an open station where they can place their items into the waiting bins which are reported to be bigger than the previous models. Hopefully, this means that the entire line will not be held up due to one slower to unload traveler. The bins themselves are equipped with RFID tags to identify as they pass through the scanners. If a bin is identified as needing an additional inspection, it can be diverted from the rest of the flow so as not to slow down the rest of the travelers as they make their way through the x-ray machine. Scanning travel documents Using these systems can be faster than having human agents checking IDs against the traveler While the use of these systems is still at its early stages in just a relative handful of major American airports, they are already showing promise. Serving a dual purpose for both identification and tracking, facial recognition has the potential to add an important layer for verification at the security checkpoint. When the traveler scans their travel documents (passport or another document), their picture can be taken to verify that they really are who they claim to be. Using these systems can be faster than having human agents checking IDs against the traveler and their database, both in terms of speed of operation and the ability to have multiple stations running non-stop without needing additional personnel on shift. Facial recognition checkpoints Along with this use, facial recognition can be used to track both travelers and others such as airport employees as they move throughout the facility. This capability can be useful for access control needs as well as a fast response for locating a person of interest While just a few years ago one might have heard more noise against the idea of using facial recognition at these checkpoints, they have become a fait accompli at this point as biometrics and surveillance have become a standard at the airports. Once the travelers have been identified and their belongings are on their way through the x-ray, it is time for them to have their persons scanned for any dangerous items. This stage is a constant point of frustration as travelers work to remove belts and any other items that have no right to set off a beep but inevitably do. Identifying suspicious items The body scanners that have become a constant of the past decade or so raise issues of their own The body scanners that have become a constant of the past decade or so raise issues of their own, ranging from privacy and health to discomfort of raising hands above head like a prisoner of war or worse. While it is still possible to request a good old fashioned pat down for those who prefer a more personal touch, there are new options out there that could offer a third way. Standoff screening allows multiple people to walk through at a time, identifying any suspicious items that they may have on their person, and alerting for secondary searches. High-end estimates place the capacity of these systems to move nearly 2,000 people through their scans in an hour, depending in part on other conditions in the mix, while the low end puts the number somewhere closer to 500. Faster security process One should recognize that they are still early stage and are probably not where they need to be yet to operate on their own without additional measures. However, despite the calculated rollout, the development of these devices is a positive that can help lead to a faster security process by reducing friction at these high-stress points. The post-9/11 era has brought about a sea change in how travelers are inspected New challenges of how to detect and defend against threats place security managers in a perpetual search for new solutions. The post-9/11 era has brought about a sea change in how travelers are inspected before being allowed to reach the gates, and eventually their flights. Whereas the hijackings of the 1970s introduced the need for metal detectors, the shoe and underwear bombers have brought about the era of the body scanners in the first two decades of the millennium. Security device innovations Developments in the field will drive the next generation of security device innovations, which themselves are still playing catch-up to the last attack. Moving forward, airport security managers are on the lookout for systems that are more automated to help their teams make securely scanning the traveling public at an increasingly larger scale a more achievable task. It is up to the innovators in the sector to provide them with capabilities that go beyond that of the human eye to find dangerous threats wherever they may be, keeping the stream of air travel flowing with minimal interruptions.
Following a successful trial, Olsztyn, Poland is the first city in the world to use blockchain to assist their emergency services, thanks to SmartKey, the blockchain connection platform. The SmartKey team has successfully connected an Ethereum smart contract to a Teltonika smart key device and app which will enable fire, ambulance and police teams to enter any part of the closed district or any secure building within the city safely and securely, without having to track down a keyholder or wait for permission. This will drastically reduce response times and has the potential to save lives. Connecting the world SmartKey connects the world of physical values, like access to locations and devices, with the blockchain of things. While this pilot uses a physical device, supplied by Teltonika, one of the largest producers of smart devices and an app, SmartKey technology does not always require this. Ultimate vision SmartKey’s ultimate vision is to be the enabler for the smart cities of the future, connecting multiple sources of data, via public blockchain, to power transport, utilities and infrastructure, and the Olsztyn pilot is just the first live demonstration. No obstruction for emergency services Gustaw Marek Brzezin Marshall of the Warmińsko-Mazurskie Voivodeship, the province of which Olsztyn is the capital city said, “The balance between the safety and security offered by access gates and vehicle barriers and the need for our rescue services to perform their duties without obstruction is a delicate one.” “The use of blockchain and SmartKey technology seems to be like the perfect solution, giving reassurance to building owners and inhabitants, but also freedom for our emergency services.” “Locating a keyholder or waiting to gain access to closed districts costs us valuable time; with SmartKey it is instant and we are excited to be the first city in the world to use this, and proud that Warmia and Masuria citizens will take advantage of such innovation.” Seamless access to secure areas “Time is everything when it comes to our emergency services,“ explained Szymon Fiedorowicz, CEO of SmartKey. “By using the blockchain to allow seamless access to secure areas we can help to save lives. With this project, we are also bringing to life smart city technology, enabled by smart contracts on the blockchain and this helps to lay the groundwork for smart cities of the future.”
Automatic Systems, a manufacturer of pedestrian and vehicle entrance control access systems, is pleased to unveil its Virtual Showroom. This 3-D immersive virtual experience brings visitors up close and personal with all of Automatic Systems’ pedestrian product lines. Easy tour navigation The Showroom was created in response to the COVID-19 pandemic, which put a halt to in person trade shows and customer visits. It enables visitors to take an in-depth tour of seven separate showrooms. On display are the various series of pedestrian products ranging from discreet and elegant swing gates, to full-height security turnstiles. Specifically, showcases include the SlimLite entry level speed gate, SlimLane swing obstacle speed gate, SmartLane retractable door speed lane, TriLane turnstile, TRS full height turnstile, RevLock revolving door, and ClearLock Series security portals. The vehicle portion showing the vast automatic vehicle gates that Automatic Systems offers is currently under construction and will be available for consultation in the coming weeks. Automatic Systems is here to support our integration partners, security consultants and end users" This web-based Virtual Showroom can be accessed anytime, anywhere from a PC via this simple link https://showroom.automatic-systems.com. Visitors simply sign in, using the language option of their choice, and can then easily navigate their tour using their mouse. The turnstiles actually open up, allowing the visitor entry into that specific showroom. Once inside, a detailed dropdown menu is also accessible that provides detailed information including product features, applications, descriptions, technical specs and dimensions. Augmented Reality App Once visitors have found the product of their choice in the virtual showroom, using their mobile device, the Automatic Systems Augmented Reality App, which is available for download from the App Store or Google Play, allows them to insert Automatic Systems equipment into an image of their own facility’s environment. This creates a rendering that will show how the entryways would look with the pedestrian products in place or which automatic vehicle gate will best suit the perimeter or parking area. Visitors can even share the rendering with others by saving the image in their project folder and then distributing. “Automatic Systems is committed to our customers and our customer relationships,” says David Enderle, VP of Sales. “Our newly developed Virtual Showroom is indicative of that commitment. The COVID-19 era has seen a huge transition from in-person meetings to virtual ones. Now, as always, Automatic Systems is here to support our integration partners, security consultants and end users. Our Virtual Showroom will keep them up-to-date on our various entrance control access solutions tailored specifically to their needs.”
ADT Commercial continues its strategic M&A strategy, expanding its nationwide geographic footprint and deepening its capabilities to serve mid-market, national, and large-scale commercial customers in New York and New Jersey with the announcement it has purchased Deterrent Technologies, Inc., based out of Ocean, NJ. About Deterrent Technologies Established in 1982 by David and Carol Hersh, Deterrent Technologies, Inc. has been a pioneer in designing, installing, and servicing comprehensive physical security and life safety systems for complex commercial environments all along the East Coast. Over the last 40 years, Deterrent Technologies has finetuned its expertise to serve customers across a wide range of industries, including global pharmaceutical firms, healthcare providers, financial institutions, legal businesses, insurance companies, educational, government, and multi-family facilities. Authorities comment “We’re thrilled to welcome Deterrent Technologies to the ADT Commercial organization and deepen our bench strength as experienced commercial security providers." "Deterrent’s customer-first philosophy perfectly aligns with our focus on customer service excellence, and we’re looking forward to the success their expertise will bring to the Northeast region,” said Dan Bresingham, Executive Vice President, ADT. “Deterrent Technologies is very excited to become a part of ADT Commercial. Our philosophy for over 40 years has been geared towards total customer satisfaction, a philosophy that ADT Commercial shares." "ADT Commercial’s national footprint will allow us to better serve our clients’ growing needs, and lastly, our dedicated team of loyal and hardworking employees will have the benefit of security, growth and the ability to continue serving our customer base,” said David Hersh, President, Deterrent Technologies.
The security manufacturer, Gallagher, is undergoing a massive expansion of their United States team, with plans to more than double their headcount by December 2020. The new roles will boost support for Gallagher’s integrator network and customer base across the U.S, as well as enable increased support and response to new opportunities. Gallagher is recruiting regional sales managers, key account managers and for roles within their federal program, as well as general sales and marketing positions. Top security manufacturers “We’ve experienced huge growth across the United States over the past few years and we’re excited to be increasing our team once again,” says Scott Elliott, Gallagher’s Vice President for the Americas. “We’re on the path to becoming one of the top security manufacturers in the five eyes alliance and we’re invested in finding the right people to support our growth potential.” Adding coverage Gallagher currently has sales managers located across California, Colorado, Florida, Georgia, Kentucky, Maryland, Missouri, Oregon, Pennsylvania, Texas, and Virginia. The new positions will add coverage for further geographical areas, with roles in New England, the Mid Atlantic, Great Lakes, Southern California, North Central, North West, Florida, and the Carolinas.
In the UK, one burglary occurs every 106 seconds. This means by the time you've finished reading this article, at least three will have taken place. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates and deter opportunistic intruders. With 58% of burglaries said to take place while the homeowner is in, it seems that even the second wave of lockdowns, and an increased number of people confined to their homes, won't do much to eliminate the risk of burglary. Prioritise security for peace of mind Security is paramount, and in the case of new build projects, should be considered from the very beginning of the design process, not as an afterthought. When it comes to securing pre-existing buildings, there are countless security options which will ensure the perimeter is robust enough to withstand opportunistic attacks. It's also worth noting that security features don't have to be complicated. There are plenty of high-tech digital systems flooding the market, which can go a long way to reduce the risk of burglary and will provide peace of mind to the end user. However, this article will demonstrate how traditional security measures, such as high-quality perimeter fencing, can ensure practical safeguarding of properties for years to come. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates Timber! There are a number of different materials which can be specified to create a strong boundary. From metal railings, to timber fence panels, they will each help deter criminals somewhat. Wooden fence panels are a popular choice for their appearance, and the right product and installation can help to increase security.Our timber acoustic fencing can also reduce noise by up to 32dB and has a solid face with no hand or footholds, while still retaining the attractive natural timber aesthetic of a typical garden fence. However, maintenance is key, and one of the first thing burglars will notice is the condition a fence is in, rather than a particular style. Therefore, old, broken or rotten fence panels are a green light for opportunistic thieves. These can be easily broken or bypassed with minimal effort. When specifying fences as part of a new build housing development, we would suggest opting for high-quality timber, as this will ensure that it is protected against rot. Look for products with an extended guarantee or those that don't need additional treatment over the years. The condition of the fence should still be regularly inspected, and simple methods such as clearing piles of leaves away from the base of the boundary can help to prevent rot which weakens the timber. Securing fence panels The recent rising cost of timber has led to a dramatic increase in fence panel theft, and panels that can be lifted from the posts are an easy target. Mitigate this risk by screwing the fence panels into the posts. This makes it much harder for the panels to be removed from the posts and creates a more secure barrier. Concrete posts do offer benefits, but we always advise on timber posts for any fencing. They're strong, just like concrete, but they continue the same natural theme as the rest of the fence. Moreover, if you screwed the panels to concrete posts, they would most likely crack and become damaged, and then be at risk to the elements. Astute design Design is also important. Installing fence rails on the inside of properties to prevent them from being used as climbing aids is highly recommended. Even better, using panels without rails on high-end developments is a clever tip if you want a secure fence with a high-spec look. Security features don't have to be complicated High fences with solid panels and no gaps in between make it considerably harder for potential burglars to climb over. They also offer better privacy to conceal rear garden areas from intruders, and are much sturdier than other alternative panels. One common mistake is designing in features such as trees or children's climbing frames too close to the boundary. These can be used by burglars as climbing aids when attempting to scale the fence, making access easy. Investigate the surrounding area, which flanks the outside of the property boundary, as an unfortunately placed bin or bench can also help criminals gain entry. If the removal of these items is not possible, designing in a spiky bush can help deter intruders. It's also worth noting that gardens with numerous large features such as bushes or sheds can also negatively impact the level of security. A clear line of sight across the entire garden is highly recommended where possible. If this view is blocked, it's considerably easy for intruders to hide undetected. Front gardens While tall, solid fence panels are recommended for rear gardens to prevent intruders from being able to see in and climb over, the opposite is true for front gardens. For street-facing gardens, a low fence or hedge is recommended to provide a clear view from the house. It also makes it much harder for intruders to hide from passers-by or neighbours, who can raise the alarm during a burglary. Another useful security technique to consider is a gravel drive. These create noise, which means the homeowner will know when it is in use. Pair this with a strong boundary fence, the likelihood of burglary dramatically decreases. This article only scratches the surface in unveiling the sheer volume of effective home security options on offer to protect homes and gardens. These investments can help minimize the risk of traumatic break-ins, while also simultaneously boosting the aesthetic of the property and its surroundings.
Schools play a key role in shaping our future. Following the reopening of classrooms up and down the country, young minds are returning to some normality. Once again they're being inspired, learning useful skills, and forging new interests to ensure our country's continued prosperity. Schools need a comprehensive security infrastructure to protect the children who attend them. Most notably, secure perimeters that keep unwanted people out, but also ensure visitors, parents, and students alike can access their shared community space without feeling segregated or unwelcome. Robust boundary fencing However, although safety is often the primary concern of parents, with tighter budgetary constraints and funds prioritised to make schools COVID safe, it can be all too easy to let important perimeter replacement or improvement programmes slip. The purpose of boundary fencing is to restrict unauthorized entry and exit The purpose of boundary fencing is to restrict unauthorized entry and exit from school grounds, and should be specifically designed to be fit for purpose. Opting for fencing with a welded pale-through-rail construction and concealed anti-tamper connectors between fence panels and posts delivers a robust boundary that's virtually impossible to break through. This style of fencing also gives a better finish with no visible joints or unsightly bolts. Attractive and practical solutions Unlike generic riveted palisade fencing, this solution is both attractive and practical, more so now that LPS 1175 SR1 certified and Secured by Design versions are available. The style of fencing should meet a school's desired security and safety requirements, simultaneously, it should not compromise on aesthetic considerations. As part of the public face of the school, it should be attractive as well as functional, helping overcome any concerns of creating a prison-like environment and promote a sense of well-being. It's recommended that perimeter fencing should be: a minimum of two metres high, vandal-resistant and sturdy, grounded on a hard surface, challenging to scale, and have an anti-climb topping, much the same as a high-security option. Access all areas Each educational site must consider the number of necessary entrances A perimeter fence requires secure access points and gates. Each educational site must consider the number of necessary entrances. These should be kept to a minimum, to make it easier to maintain control of visitor movement. However, in larger schools this is not always possible and additional entrances may be required to prevent potentially dangerous congestion at the start and end of the school day. Furthermore, separate gates must be installed for vehicles and pedestrians to ensure they are kept at a safe distance, and avoid unnecessary openings of large, double leaf gates. All access points should be locked during the day to keep students on-site and prevent intruders from gaining access to school grounds. Gates should ideally be matched in design, height and construction to the fencing, to prevent creating vulnerable areas and compromising security. Automatic vs manual While automatic gates offer more control, manual gates shouldn't be overlooked. Not only are they easier to install and usually cheaper than automated gates, but they also don't rely on power, so if your site's supply is cut off, they provide a hassle-free exit. Furthermore, gates that are only used at the start and end of the day can be easily locked manually by staff. However, automated gates do offer welcome flexibility, as they include access control devices such as remote controls, keypads and card readers, which will also increase the school's security. They're also robust and heavy, meaning it's incredibly difficult to force them open. Electric gates offer additional versatility with a choice of either full automation, or a hybrid of manned and automatic security, with staff able to allow visitors access via intercom or video system. Securing outdoor facilities It’s also essential to consider outdoor areas when it comes to specifying security options for educational environments. Specialist security fencing should be specified where recreational areas double up as the school’s boundary fencing. The security of the site's sports facilities will also need to be considered. Commonly known as MUGAs (Multi-Use Games Areas), enclosures can be designed with specialist mesh systems to allow multiple sports to be played in the same location while providing safety to participants, spectators and buildings. When it comes to play areas in nurseries and junior schools, installing RoSPA approved and BS EN 1176 compliant fencing and gates is recommended. These are available in both timber and steel options and tested for their ability to provide a safe fencing and gate solution - designed to reduce the risk of limb entrapment. Acoustic fencing is also worth considering for these environments, particularly in urban areas or where housing is close to school play areas. It can help reduce incoming ambient noise from neighbouring busy roads, railway lines, or construction sites, and contain the school noise within its boundary. Offering sufficient protection Focus on learning unimpeded by threat The current generation of children deserve an environment where they can focus on learning unimpeded by threat. Schools need robust perimeter solutions that welcome pupils, offer peace of mind to parents, and provide them with sufficient protection against intruders. Ultimately, it's the responsibility of the head teachers to engage in dialogue with knowledgeable security professionals to get the most appropriate and effective security solutions for their school, staff and students.
COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets, and staff, from physical attack. Fundamentally, it’s the responsibility of the facilities managers and specifiers to incorporate and carefully balance physical security strategies around healthcare sites to protect patients, visitors, property and assets. The challenge is that many of these sites are continually increasing in size and complexity to meet the higher demand from the population. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector to enable it to operate effectively 365 days a year. Effective access control Hospitals are fast-paced environments where life and death outcomes often hang in the balance of only a couple of minutes. Efficient, seamless access is therefore key. All gates and access points around the perimeter must be assessed and considered and these access points should be installed and controlled centrally, or regularly monitored. Fencing, gates, storage enclosures and access control are part of a solution in securing this service sector Consider the types of vehicles that require access; the appropriate solution should ensure that, where necessary, emergency vehicles can get in and out of the site unhindered. Effective design for maximum security If automated gates are specified, underground operators are highly recommended to remove any visible signs of surveillance on display. When designing pedestrian and vehicular access: gates should be DDA (Disability Discrimination Act) compliant. Crucially, the design of fencing and gates must accommodate rapid evacuation and access for emergency services. With regards to the car park, it may require rising arm barriers or bollards to secure it. These solutions control access and separate pedestrians from vehicle traffic whilst protecting different buildings, such as specialist units and emergency wards. Promoting wellness through aesthetics Creating a welcoming environment is a core priority when specifying security options for hospitals. Razor or barbed wire may be effective deterrents to potential trespassers, but they create an intimidating and unwelcoming aesthetic, far removed from the sense of wellbeing these developments should promote. A solution that offers both visual appeal and high levels of security is vertical bar security fencing or welded mesh panels. Both provide strong boundary protection and excellent visibility for surveillance, while offering greater protection than other alternatives. Recreational areas For areas requiring a 'softer' appearance, such as gardens and outdoor recreational areas, timber fencing is an ideal option. Timber has a natural, welcoming appearance and promotes a sense of wellbeing and privacy. As well as offering a pleasing aesthetic, it can also provide a high level of noise protection. This makes it well suited for acoustic fencing, which can improve recreational and recovery areas by protecting them from high levels of noise, transforming them into little oases of calm ideal for recuperation. Outdoor storage areas Hospitals and other medical facilities produce a large amount of medical waste which requires secure outdoor areas and bin stores to hold hazardous materials on-site before they're taken away. Hospitals have a responsibility to ensure these areas are secured using risk-appropriate fencing to avoid potentially dangerous materials getting into the wrong hands. Risk assessments Creating a welcoming environment is a core priority when specifying security options for hospitals Risk assessments are key to ensuring a risk-appropriate solution is installed. For facilities at risk of criminal activity, products accredited by standards including Secured by Design or the Loss Prevention Standards Board’s LPS 1175 are proven to reduce the likelihood of crime. It’s also best practice to locate storage areas in areas away from climbing aids such as lamp posts or trees. The fence should also be high enough to deter attempts at climbing. There are many effective and easy-to-install options on offer when it comes to specifying security for healthcare infrastructures. It is important that each site is judged individually. Every institution is different and will require a unique plan of security structures to ensure it is safe for all personnel.
A USB drive from Heathrow Airport, found on a London street in late October, contained confidential information about accessing restricted areas at the airport and security measures used to protect the Queen. The drive also contained a timetable for anti-terrorism patrols at the airport and documentation of the ultrasound system used by Heathrow security to check perimeter fences and runways for breaches. The data was not encrypted, and the London resident who found it turned it over to a newspaper reporter. How Cybersecurity Impacts Physical Security The incident highlights a number of issues for security professionals. One is the interrelated nature of cybersecurity and physical security, and how a failure of one can directly impact the other. Another is extending cybersecurity outside the firewall, considering the inherent risks of USB drives and the need to manage “endpoint security,” such as restricting access to a system’s USB ports. An important security failure in the case of the Heathrow incident was lack of encryption of the USB drive, says Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology, which provides a line of USB drives with hardware-based encryption. “If you block out all the USB ports, it can restrict productivity, and employees are not as efficient as they should be,” says Lugo. He says companies should be using more encrypted USB drives to combine the productivity advantages of allowing USB access while protecting the information on the drives. Data Protection Regulations Protection of data – whether inside the firewall or outside – is increasingly important in an age of greater cybersecurity regulation. The European Union's General Data Protection Regulation (GDPR) creates new safeguards and requirements for protecting personal data, with a compliance deadline of May 25, 2018, after which noncompliance can result in expensive fines. A disgruntled employee used a USB drive to steal banking information for 30,000 people, as published by Tom Brant in: “Report: FDIC Employees Caused Repeated Security Breaches,” PC Magazine, July 15, 2016 Regulations also include New York State's 23NYCR500 cybersecurity requirements that financial services companies protect customer information and related IT systems. The New York regulation requires each company to assess its specific risk profile and design a program to address its risks, ensuring the safety and soundness of the institution and protecting customers. Hardware-based Encryption Providing a cybersecurity tool, Kingston highlighted its hardware-based encrypted USB drives at the recent ASIS show in Dallas. A USB drive with hardware-based encryption is self-contained and doesn’t require a software element on the host computer. No software vulnerability eliminates the possibility of brute-force, sniffing and memory hash attacks. Digitally signed firmware cannot be altered, and there is a physical layer of protection, too. The drives come in epoxy-dipped/filled cases that prevent access to the physical memory. In contrast, a USB drive with software encryption uses software that runs on the host computer and is vulnerable to attacks. The use of AES 256-bit encryption in XTS mode ensures that anyone who finds a USB drive, such as the man in London, cannot access the information. The drive wipes itself clean after 10 attempts of guessing the password. “Encrypted drives are not complicated,” says Lugo. “They are a simple solution that anyone can implement.” Kingston’s encrypted USB drives are priced between $40 and $600, depending on the capacity and covering needs ranging from a small business owner to military- and government-grade products. Kingston also provides products for use inside the firewall, including business and enterprise solid state drives (SSDs), offering high density and extreme performance, and their server premier DRAM memory products providing performance and flexibility. To learn more about Kingston, please visit www.kingston.com
The massacre in Las Vegas is both sadly familiar and terrifyingly novel. Because of the recent series of violent attacks on innocent people gathered in public places, high body counts are no longer unheard-of, although the 59 dead after the Las Vegas tragedy sets a depressing new record. These news stories have become so grimly commonplace as to dull our collective sensitivity to their shock. However, the modus operandi of the latest attack, apparently by a “lone wolf” – carefully planned and involving a stockpile of nearly two dozen guns gathered in a hotel room – prompts new soul-searching about how public events are secured, not to mention a re-evaluation of security in the hospitality sector. Public Events At Risk From Attack The sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. Such attacks are not unheard of, but to what extent might it have been foreseen in this instance? It’s a new concern to add to the mounting list of possible risks at public events, such as a car in the crowd or a bomb in a backpack. Add to the list a firearm assault from above. If security is supposed to protect against that which is reasonable and foreseeable, this tragedy clearly expands the list. Preventative Measures For Sniper Attacks Certainly, there are measures that can prevent sniper attacks, such as police officer sharpshooters positioned on nearby rooftops scanning the windows of nearby buildings for potential threats. Such measures are routinely employed for high-security events such as a Presidential visit, but not generally for a country music concert. Should organizers of public events reevaluate the level of risk, now that the dangers have been demonstrated in a dramatic and deadly fashion? Broadly speaking, nearby buildings with lines-of-sight to public areas are a new security risk to be considered. Might public events need to be located somewhere else? What about parades down city streets, or Times Square at New Year’s Eve? New York’s Police Commissioner James O’Neill may have said it best: “We do understand that no city or town in this country is completely immune.” Security In Hospitality Sector The implication of the Las Vegas massacre for the hospitality industry is an additional issue. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. Most hospitality companies keep their focus on things like limiting theft, controlling unruly guests, or keeping strangers from roaming the halls. In contrast, hotels in the Middle East and Asia, where there has historically been more chance of violence, have a higher level of security. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals Even in Las Vegas, where the gaming and hospitality industries embrace video in a big way, the emphasis is not on watching guests who may be stockpiling firearms. What might the impact of greater security be on guests and, by extension, a hotel’s business? In a competitive market that emphasizes the guest experience, any negativity suggested by additional security measures would likely be evaluated carefully lest it impact the bottom line. Anything perceived as invasive of a guest’s privacy would be frowned upon. Our appetite and/or tolerance for tighter security in the wake of a tragedy will inevitably dissipate over time. In short, the hospitality industry is likely to continue to be a “soft target” for years to come. New Security Training And Technologies Might a higher level of training among hotel staff to promote awareness of suspicious behavior make a difference? It’s a low-profile, comparatively low-cost possibility many hospitality professionals will be looking at in the days to come. There are less obtrusive technologies on the market that could help. For example, Steve Wynn, CEO of Wynn Resorts, has said they have installed “non-visible” metal detectors at every entrance. One manufacturer of such equipment is PatriotOne Technologies, which offers a “cognitive microwave radar technology” embedded in a wall or stand-alone unit at a controlled access point. The company made news at last week’s ASIS show by announcing integration of its system with March Networks’ video recording solution. Concerns For Security Trade Shows The latest tragedy hits especially close to home for those in the security industry who travel to Las Vegas every year for the ISC West show. Mandalay Bay is at the other end of the strip from much of the ISC West activity, but the attack still seems to hit directly in our neighborhood. Next year, the security market will be going to Vegas at least twice, for ISC West in the spring and again for the ASIS 2018 show in the fall. Somewhere in the midst of those events may be a solution that could help prevent such tragedies. We can all hope so. Meanwhile, our thoughts are with the victims of the Las Vegas massacre, their families and friends. Infographic: How To Prepare For Active Shooter Incidents
Perimeter security has evolved in recent years from an emphasis on fences and low-cost sensors to a broader systems approach that incorporates a variety of technologies. Protech is among the companies leading the transition and positioning itself as a one-stop systems provider at the perimeter. Mergers And Acquisitions In 2014, U.S.-based Protech merged with Sorhea, a French manufacturer of perimeter security systems. The combination expanded Protech’s business from one product to the ability to supply an entire system. Parent company Groupe ST also owns TIL Technologies, which designs, manufactures and markets electronic access control, intrusion detection and video systems. Sorhea is strong in Europe, the Middle East and Africa, and Protech’s plan is to further expand its presence and range of systems in the United States in the next year and a half, while building a network of well-trained integrators. Just this year, Groupe ST also acquired VideoWave Networks, a developer of video analytics systems that detect and track objects in outdoor environments – adding another new element to the portfolio, and the ability to supply systems with even more capabilities. Sorhea/Protech CEO Eric Thord calls it “the last piece of the puzzle.” "It’s easy to make a product that will detect whensomething happens, but youalso need to not detect whennothing happens" Expanded Product Range At the recent ASIS show, Protech exhibited its expanded range of products, including those from Sorhea and VideoWave. “Our systems are sophisticated and reliable, but they are also cost-effective, especially if you consider the total cost including less-expensive installation,” says Thord. Thord also emphasizes Protech/Sorhea’s spending on research and development – some 8 percent of revenue – which will ensure a flow of technology launches in the near future. “We have sophisticated security products, and we make sure the products are reliable,” says Thord. “It’s easy to make a product that will detect when something happens, but you also need to not detect when nothing happens.” The largest vertical market for perimeter security has historically been corrections. Protech is also making a mark in airports and transportation, electrical utilities, water treatment and supply, government, and oil and gas refining. Power And Connections A differentiator for Protech/Sorhea is the ability to provide systems that are not heavily dependent on infrastructure. Perimeter security areas may be remote and far away from network connections and/or power supplies. Protech’s solar-powered and wireless sensors are not burdened by infrastructure requirements. Protech/Sorhea’s Solaris infrared beam technology provides a virtual fence to detect intrusion. It is wireless and solar-powered and works with a radio mesh network. There is a 300-foot range per system, and local or remote access is available through an integrated web server. Minimal, or even no, infrastructure is required, given the system is solar-powered (with battery backup) and communicates wirelessly. There are no trenches to dig. Anti-condensation caps designed into the product prevent the presence of condensation and ice on the infrared cover, thus allowing for correct functioning in all weather. Protech has a wired systemcalled Maxiris, an IR beamvirtual fence that provides"pinpoint" intrusion detectionin up to three zones Multiple Sensor Intrusion Detection Protech also has a wired system called Maxiris, an IR beam virtual fence that provides “pinpoint” intrusion detection in up to three zones. It also needs minimal infrastructure, offers a 300-foot range, and can be accessed locally or remotely through a web server. There are multiple modular styles for expansion. The company’s Apiris products use multiple sensor technology – the virtual fence combines an active infrared, dual technology sensor and microwave barrier into a single operating interface. The G-Fence/G-Wall fence and wall-mounted system offers accelerometer-based detection. It can detect dynamic cut and climb activity and pinpoints intrusions to within 10 feet. There are both solar and powered models. The Piramid dual technology motion sensors use stereo Doppler technology for targeted detection – direction, speed and distance. In addition, the Protech VideoWave video analytics object detection and tracking will be available in 2017. “We have a breadth of technology that could be packaged as a total solution or sold independently,” Greg Zuckett, Protech’s Vice President, Sales and Marketing, told me at their ASIS booth. “We offer detection at the outermost perimeter, and then track the intruder as they move closer to the facility.” He says he was pleasantly surprised by the tremendous interest in their products at the ASIS show.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
Beginning September 1, 2020, six Vision-Box Automated Border Control (ABC) eGates will greet arriving travelers enrolled in the NEXUS Program at Winnipeg International Airport. As the only international airport in the Province of Manitoba, Winnipeg is an important travel hub for the region, having served close to 5 million aviation passengers in 2019. NEXUS program NEXUS is a trusted traveler program operated by Canada Border Services Agency (CBSA) that expedites border crossings for pre-approved and enrolled Canadian, American, and Mexican citizens. Travelers enrolled in the NEXUS program avoid border entry lines by using specially reserved lanes equipped with identity screening platforms for expedited checks when entering the country from anywhere in the world. Automated Border Control (ABC) eGates ABC eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers The Automated Border Control (ABC) eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers from all international locations using safe and secure automated biometric facial matching. “Finding better ways to serve the needs of travellers is paramount for Winnipeg Airports Authority,” said Barry Rempel, WAA President and Chief Executive Officer (CEO), adding “Adding Vison Box eGates for NEXUS users at Winnipeg Richardson International Airport not only enhances the customer experience but sets the foundation for future innovation and brings us one step closer to seamless, touchless passenger travel.” NEXUS touchless solution This is the first time that ABC Biometric eGates are being deployed to process NEXUS enrolled Travelers, instead of the regularly used NEXUS kiosks. It is also the first NEXUS touchless solution that will improve the border clearance process and give NEXUS travelers a unique convenience at the airport. The deployed GT-11 eGates are part of Vision-Box’s newest generation digital identity systems and will use the latest advances in biometric technology to securely and efficiently clear travellers using digital facial matching. The GT-11 eGates offer a smaller footprint than the previous NEXUS kiosks and are part of a modernizing process for a seamless travel journey from curb to boarding at Winnipeg International Airport. Remote installation of border digital identity software This may also be the first time that a complete remote installation of border digital identity software has been successfully attempted and completed. Because of the COVID-19 pandemic that quickly spread across the globe, work at Winnipeg International Airport had to be stopped in February 2020, with only the physical installation of the eGates completed. Software and systems setup The ability to go live with a remote orchestrated installation is a major accomplishment" Logical setup of the software and system testing, prior to going live was then completed entirely from Vision-Box Lisbon headquarters, in close collaboration with Canada Border Services Agency (CBSA), using a dedicated secure connection. By remotely installing a border processing system, Vision-Box proved the feasibility and security of a remote installation process that could lead to far-reaching industry changes and cost-saving measures. “The ability to go live with a remote orchestrated installation is a major accomplishment,” said Miguel Leitmann, Vision-Box’s Chief Executive Officer (CEO), adding “Our team, along with CBSA and members of the Winnipeg Airport Authority worked tirelessly across time zones, with frequent and intense communication, to make this happen. I couldn’t be prouder of this accomplishment and I congratulate all the agencies and people involved in making this project a reality.” Orchestra Digital Identity Management Platform Vision-Box’s Orchestra Digital Identity Management Platform will manage the Nexus border clearance and crossing process. Orchestra manages in real-time the necessary parameters of traveler identification at the crossing point. After the traveler scans their NEXUS member card, a photo is taken of the traveler’s face and a secure identification match is made against the biometric facial information in the traveler’s NEXUS membership profile. This system gives CBSA and Winnipeg International Airport added flexibility with faster dedicated lanes that simplifies the airport border clearance process along the way.
Future residents at Kebbell Homes’ new prestigious development, Wintersbrooke will be able to receive and answer door entry requests via cellphone or Amazon Alexa voice control, thanks to Comelit’s WIFI connected monitors. Set in Ascot, Berkshire, Wintersbrooke is a grand, new gated community featuring just six spacious and exclusive 2-3 bedroom apartments within mature, secluded communal gardens. Kebbell Homes has used Comelit’s specification team on previous developments and again called upon its services, together with chosen installers R&M Bailey, from the initial design process, through the work’s program to project completion. Door entry, via Comelit’s mini handsfree WIFI monitors, will enable new residents to respond to door entry requests from their cellphone, and also integrates with Amazon Alexa for voice announcements and control of the gate/front door to the block. Facial recognition technology The monitors provide facial recognition technology for authorized guests to gain access and video memory, to record any missed calls. Says Andrea Fawell, Sales and Marketing Director at Kebbell Homes: “With high expectations for Wintersbrooke’s indulgent design to deliver gracious living for our discerning buyers, every element had to be considered to offer the highest level of luxury and specification. And to ensure all feels safe and secure.” All the smart home security systems installed had to be equally stylish and futureproof" “We had worked previously with Comelit and knew its systems were able to achieve the level of style intended to complement Wintersbrooke’s dignified presence. The additional benefits of WIFI connected monitors provide our soon to be residents with latest integrated smart security technology, seamlessly installed, enabling them to instantly respond to door entry requests, at their choice and from wherever they are.” Smart home security systems Mat Bailey, Director from R&M Bailey added: “Wintersbrooke has the look and feel of a private country home, which epitomizes Kebbell Homes’ well-known flair for grand architecture. All the smart home security systems installed had to be equally stylish and futureproof. Comelit’s Mini Handsfree WIFI was the natural choice for door entry, easy to install via wireless technology and simple to integrate. Just the one solution presents future homeowners with user friendly bespoke options that can connect seamlessly with their home security, and be controlled by cellphone and Amazon Alexa, at their own choice.” Each home at Wintersbrooke has been fitted with a Mini Handsfree monitor complete with integrated WIFI, operating through Comelit’s renowned Simplebus 2 wire. At the striking gates to the development is Comelit’s premium stainless steel flush mounted, 316 Sense digital entrance panel. Door entry system Up to fifteen smart devices can be connected to each and every property’s individual WIFI monitor The system enables new residents to grant access through the vehicle gates or adjacent pedestrian gate using the internal monitor or a dedicated mobile app. A second is fitted on the front door of the development itself. Up to fifteen smart devices can be connected to each and every property’s individual WIFI monitor. Daniel Wood, Southern Sales Manager at Comelit UK concluded: “Once again, it was a pleasure for Comelit to work closely with Kebbell Homes to ensure the complete door entry system installed at Wintersbrooke, achieved the desired balance between timeless style and latest technology." Alexa voice control "From the gated entry using our Sense panel, which at only 3 mm thin, blends in with any building due to the panel's slim profile, to the chic WIFI monitors, the combined solution, provides aspiring residents with a powerful door entry system and the convenience of audio and visual communication, together with ease of use via mobile or Alexa voice control in everyday life.” Comelit’s official website can be visited for more information on Comelit’s ViP System, Mini handsfree WIFI Monitor Door Entry Solutions or range of products.
Amthal has worked closely with the management team and residents at Kenilworth Court to ensure fire and security upgrades on site occur without compromising on aesthetics of the Edwardian mansion blocks. Situated in Putney, Kenilworth Court consists of eight purpose-built Edwardian style blocks of flats, completed in 1904 – 1905. Featuring 150 portered flats, with a garden in the middle, it is now run by the controlling company, Kenilworth Court Co-ownership Housing Association Ltd. Upgrading door entry system The opportunity to upgrade door entry from audio to video capability saw the initial introduction of Amthal to the development. So successful in understanding the importance of keeping with original design features, working closely with the management team and residents, from initial specification through installation and project completion, Amthal now additionally maintains security gates and all fire requirements on site. Video security system at Kenilworth Court Steve Logie, General Manager at Kenilworth Court Co-Ownership Housing Association Ltd, said “With the historic significance of our development, and the pride of notable residents who have lived here, any upgrades, however small, must be carefully considered with regards to how it will impact on the aesthetics of the overall premises.” Steve adds, “Amthal understood this and worked closely with us and our residents, carefully taking in feedback to create bespoke video door entry solutions that blend with the grand entrances. Installation was sympathetic, always ensuring wiring was discreet and ‘boxed in’ where necessary.” He further said, “So impressed with their customer service and technical ability, we now consider them our preferred supplier for all fire and security maintenance.” CAME BPT brass entrance panel installed Based on resident feedback, Amthal created and installed a bespoke CAME BPT brass entrance panel for Kenilworth Court Based on resident feedback, Amthal created and installed a bespoke CAME BPT brass entrance panel for Kenilworth Court, allowing all homeowners to benefit from stylish video door entry technology. Residents and staff also benefit from an upgraded Paxton Net2 access control system, with dedicated fobs distributed to ensure safe and secure block entry. Phil Bryant, Amthal Strategic Accounts Team Manager added, “The key to our success with Kenilworth Court was taking the time initially to create an installation works program with video door entry systems that could blend in visually without disrupting the architectural aesthetic of the development.” Enhanced security system Phil adds, “We spoke with the management team and residents throughout the design process, bringing door entry styles and samples to ensure everyone was confident in the installed final solution.” He further said, “From this, our engineering team and customer service has built up a trusting relationship where residents understand our needs to operate internally, sometimes within apartments themselves and also through communal areas. And the management team has peace of mind that fire and security requirements will be maintained to exceed standards across the development.” Security solutions expert Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Synectics has secured a multi-site protection contract for a customer whose infrastructure assets are considered critical to national security. Responsible for maintaining an energy network that supplies over 3.9 million homes and businesses, the customer required a centralized system to guard against both physical and cyber threats at five key sites – each recognized as a national asset with corresponding levels of access clearance. The Synectics solution, driven by its Synergy 3 command and control platform, integrates third-party sensors, analytics, cameras, systems, personnel databases, and edge devices. The resulting level of situational awareness gives the team – based at the customer’s state-of-the-art Alarm Receiving Center (ARC) – complete oversight and control of security, safety, and site-management systems at each facility. Electrified perimeter-fence systems As part of the contract, Synectics will also provide a redundant ARC solution for failover scenarios. The core integrations included as part of the project ensure alerts and responses are linked to, and can implement direct control of, door-access systems, intrusion-detection systems, intercom technology, and the electrified perimeter-fence systems deployed at each location. Synectics will conduct a complete system FAT, which includes all specified third-party software and hardware, at its dedicated UK testing facilities. Given the high-risk, high-security nature of the project, the provider’s ability to system-test at such scale was a crucial factor in the contract being awarded. The five locations to be monitored from the ARC are government-authorized to trigger armed response units to deal with imminent or actual threats. Command and control system In addition to meeting technical resiliency specifications, Synectics will be providing cybersecurity consultation The solution will, therefore, employ customized workflows to support incident (alarm) validation and protocol-compliant responsive action. The solution will also see each site equipped with its localised command and control system for on-site management, with the ability to manually and automatically escalate incidents to the ARC team as required. Cybersecurity was a specific focus of the brief. In addition to meeting technical resiliency specifications with authentication and encryption solutions, Synectics will be providing ongoing cybersecurity consultation, working in partnership with in-house specialists to ensure the continuous development of protective measures. Third-Party system Martin Bonfield, UK Sales Manager at Synectics, commented: “The perfect alignment between customer requirements and Synectics’ track record in CNI meant the lead integrator came directly to us with this exciting project. Our credentials and expert team, coupled with Synergy 3’s ability to remotely integrate and interoperate with any third-party system vital to effective operations, meant we ticked multiple boxes." "We are regarded in the industry as a safe pair of hands with the relevant experience, and an innovator with the forward-focused technology required to meet all aspects of the brief.”
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The residential/smart home market is undergoing revolutionary transformation, with a flood of new products and technologies helping to make our homes more connected, easier to manage and, yes, smarter. These massive steps forward provide challenges, and also opportunities, for the security industry, which has played a major role in protecting homes and residents for decades. We asked this week’s Expert Panel Roundtable: How are changes in the residential/smart home market impacting security?