Green security
They are excited to announce that RapidSOS is officially integrated with Apple Emergency SOS Live Video, now available with the release of iOS 18! Emergency SOS Live Video allows those in need to share streaming video and recorded media during emergency calls. During an emergency call, participating emergency dispatchers can send a request to share live video or photos over a secure connection, making it quicker and easier to provide urgent assistance. Emergency SOS Live Video ECC telecommuni...
SoSafe, Europe’s largest human risk management solution, has been named a Strong Performer in a recent report evaluating top vendors. This recognition underscores SoSafe its position among top vendors and balanced approach to privacy, customer impact, and innovation. Human Risk Management Solutions The Forrester Wave™: Human Risk Management Solutions, Q3 2024, evaluates nine vendors based on their current offering, strategy, and market presence. According to the...
Quanergy Solutions, Inc. invites attendees of GSX Orlando 2024 to experience the “next big thing” in physical security with their Q-Track™ 3D LiDAR (Light Detection and Ranging) solution on show, designed for advanced security and business intelligence applications. “At Quanergy, we believe that 3D LiDAR technology is a game-changer for the physical security landscape,” said Enzo Signore, CEO of Quanergy. “GSX Orlando is the perfect stage to showcase how our...
Dataminr, one of the world’s pioneering AI companies, is launching ReGenAI (Regenerative AI), a new form of generative AI that automatically regenerates textual descriptions as events unfold. Using predictive AI to analyze and synthesize key developments detected in more than one million public data sources, ReGenAI distills multidimensional events into concise event briefs that dynamically update. Regenerating event Customers can gain a rapid understanding of an evolving event th...
At GSX 2024, Hanwha Vision (Booth #1701) is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence delivering new data-driven business insights. GSX attendees will see new applications of AI in Hanwha Vision’s IP cameras enabling precise detection, robust search, elevated data analysis, and enhanced image quality. Intelligent software solutions With the new OnCloud VMS...
DNAKE, a provider of intelligent technology solutions, is excited to announce its participation in the upcoming Intersec Saudi Arabia 2024. Join DNAKE at this prestigious event, where they will showcase the latest innovations and technologies in the field of intercom and smart home automation. With a commitment to enhancing safety and convenience, DNAKE looks forward to connecting with industry professionals, exploring new opportunities, and shaping the future of smart living together. W...
News
ADI Global Distribution, a pioneering wholesale distributor of security, AV and low-voltage products, announced it has expanded its operations into Germany. This expansion marks a significant milestone in the company's growth strategy, and underscores its commitment to delivering innovative and reliable security, AV and low voltage products. Integrated solutions “ADI's entry into Germany represents a pivotal moment for our company, and we are excited to bring our extensive product portfolio to this market,” said Hemant Trivedi, Vice President & General Manager, International, ADI. “Our goal is to support German customers with the products, support, and services they need to build complete, integrated solutions. We're committed to fostering strong customer and supplier relationships to drive shared success, and continue expanding our presence across the country." ADI's comprehensive portfolio ADI has staffed a full team across a variety of functions to support German customers With a new country headquarters office located in Düsseldorf, Germany, ADI has staffed a full team across a variety of functions to support German customers including dedicated field sales, inside sales support, technical field and desk-based support, marketing, digital experience, finance and more. ADI's comprehensive portfolio includes products from more than 45 pioneering brands across video surveillance, intrusion and smart home, access control and communications, fire, data communications and audio visual. In addition to a diverse range of products, ADI offers numerous value-added services including pre- and post-sales support, local expertise, training, online ordering, and more. ADI's extensive product and services To commemorate its entrance into Germany, ADI will exhibit at the upcoming Security Essen international trade fair from 17-20 September. Attendees are invited to stop by Hall 5, stand 5B33 to meet the local ADI team, learn more about ADI's extensive product and services offering, and see how ADI can help to grow their business. ADI Germany will be led by Frank Lehrich, Country Sales Pioneer, who is focused on ensuring the company's offerings are tailored to meet the evolving needs of the German market.
London’s iconic Shakespeare’s Underglobe Theatre set the stage for the much-anticipated Women in Security Awards 2024. With places booked months in advance, the event was filled, bringing together outstanding women from diverse roles across the security sector. Talent and dedication Organized annually by Professional Security magazine in collaboration with patron Una Riley, the Women in Security Awards are widely regarded as a prestigious platform celebrating the achievements, contributions, and exceptional leadership of women in the field. 2024’s ceremony was no exception, showcasing the extraordinary talent and dedication that women bring to the wider world of security. Celebrating achievements Once again, the National Security Inspectorate (NSI), the UK's premier certification body for security and fire safety providers, was a proud sponsor of the awards. NSI extends its congratulations to all of the winners and finalists. In particular, NSI is proud to celebrate the achievements of those representing NSI-approved companies, who were recognized in four of the five award categories: Security Manager Amy Stanley – FGH Security (Winner) Frontline Christyll-Ann Bryans – CIS Security (Finalist) Lisa Newton – Sodexo (Finalist) Business Manager Sophie Harper-Booth – City Group Security (Finalist) Technical Hannah Powell – ASEL (Finalist) NSI congratulations also go to Lynda Moore, who was honored with the Baroness Ruth Henig Award. Strength of women Commenting on the evening’s success, NSI Chief Executive Richard Fogelman said, "It is an absolute privilege to support the Women in Security Awards, an event that continually recognizes the incredible contributions women make to our industry." "These awards not only shine a spotlight on their professional excellence but also serve as an inspirational example for the next generation. At NSI, we are committed to fostering diversity and supporting the achievements of all security professionals, and tonight’s celebration is a testament to the strength of women helping to shape the future of this vital sector."
Wavelynx Technologies, a trailblazer in advanced, secure, and versatile reader and credential solutions, announced the launch of its industry-first app, Configure by Wavelynx, to revolutionize the way businesses approach security and badge reader management. With Configure, integrators, and partners can simplify the installation, customization, and on-site updates of Wavelynx readers - all from their mobile devices. Configure Configure brings a new standard to how readers are maintained and installed. It not only eliminates the need for a traditional configuration card but creates a seamless path to enabling wallet credentials. The company will showcase Configure at the Global Security Exchange (GSX) trade show in Orlando, FL September 23-25, 2024. Access control and security “As the industry is moving to mobile-first solutions, Configure represents a significant leap forward within access control and security management,” said Rob Lydic, President of Wavelynx Technologies. “By addressing the needs of installers, partners, and facility owners alike, we are setting a new standard for efficiency, security, and ease of use in the industry.” Secure updates and seamless interoperability Coupled with a secure key management process, users take comfort in knowing that with Configure Configure employs state-of-the-art encryption to ensure the secure transmission of data while implementing stringent authentication protocols to safeguard against unauthorized access. Coupled with a secure key management process, users take comfort in knowing that with Configure, their keys are protected, they can add a new device at any point and they can run a field upgrade securely in minutes. User-friendly configuration and management Wavelynx’s latest offering is centered on its intuitive toolset and user interface, allowing quick setup and real-time adjustments. Configure empowers users with on-demand updates and management capabilities, streamlining the entire configuration process from a single, handheld mobile device and interface. Intuitive mobile experience Configure is available immediately for deployment across various sectors, including commercial “Our customers love the simple and straightforward nature of implementing our solutions,” said Lydic. “We consistently hear positive feedback about our readers and Configure takes it to the next level with its intuitive mobile experience, saving ample time for integrators out in the field.” Configure is available immediately for deployment across various sectors, including commercial, industrial, and institutional facilities. Meet with Wavelynx at GSX At GSX, Wavelynx will collaborate with more than a dozen partners including AlertEnterprise (booth #1709), RightCrowd (booth #2243), and others, in showcasing the solutions modernizing the access control industry. In addition to Configure, Wavelynx will also showcase: Ethos™ readers: engineered with interoperability in mind to implement existing access control systems simple and secure. The Wavelynx Wallet: paves the way for digital credential systems as the industry moves toward mobile and unlocks more modern, secure, and interoperable access control solutions. Accelerate by Wavelynx: accelerates adoption of modern access control systems by providing a cost-effective path to secure wallet credentialing solutions.
Dallmeier, one of the pioneering providers of professional video surveillance solutions, presents the new Panomera® S4 Perimeter. The “Perimeter Panomera®” combines four sensors in one optical unit. This provides a resolution of 200 effective megapixels – MPe – per camera. Combined with an AI object classification system specially trained for perimeter requirements, and AI tamper detection also optimized for this purpose, the result is an extremely powerful solution with comparatively low infrastructure, system, and personnel costs. Panomera® S4 Perimeter The surveillance of narrow strips along perimeters such as fences, buildings, or roads, often referred to as “sterile zones”, is one of the most demanding requirements for physical security. Until recently, video systems such as the major system on the perimeter have often failed to live up to user expectations, particularly in high security environments: unsatisfactory detection performance, high false alarm rates and, above all, the fact that the analytics are easy to manipulate are often cited as disadvantages. Other shortcomings include poor image quality and high infrastructure costs, particularly due to the large number of cameras required. The new Panomera® S4 Perimeter from Regensburg-based manufacturer Dallmeier promises to help. Specially trained perimeter AI Panomera® S4 Perimeter reliably recognizes people with unusual body postures such as bent over Equipped with a neural network specially trained for perimeter protection, the Panomera® S4 Perimeter reliably recognizes people with unusual body postures such as bent over, crouching or lying down and movement patterns such as very slow, very fast or crawling. People wearing camouflage such as Camouflage Central Europe, British Smock or Ghillie are also reliably detected. Combination of perimeter AI and AI tamper detection The advanced AI tamper detection application supports the detection of tampering attempts that are typically expected at a perimeter. In addition to classic methods such as twisting, defocusing, spray-painting, and covering the camera or IR illumination, blinding the camera with a laser pointer, flashlight, or strobe light is also reliably detected. Furthermore, indirect tampering by deliberately fogging the detection area with pyrotechnics such as smoke grenades or smoke pots is detected and an alarm is triggered. The combination of both evaluation techniques provides optimum detection of intrusion attempts with a very low error and false alarm rate. Perimeter App The Panomera® S4 Perimeter has outstanding low-light performance. The latest generation of sensors is three times more sensitive to infrared light than its predecessors and delivers outstanding results even in low-light conditions. With a dynamic range of 130dB, it can accurately capture details at distances of up to 200 meters, providing excellent results even in difficult lighting conditions. With the specially developed AI Perimeter application, users can define specially protected areas with pre-zones. When relevant objects (people, vehicles, etc.) enter these zones, it is possible to escalate messages to focus operators’ attention on the most important events. One for the right, one for the left: For optimum geometry Depending on the model, the sensors are oriented to the right or left and arranged in perspective The camera’s special perimeter geometry minimizes blind spots and avoids capturing uninteresting areas beyond the fence – an important privacy benefit. Depending on the model, the sensors are oriented to the right or left and arranged in perspective. This means that even unusual postures and movements can be detected. The camera detects the upper body of a standing person from a distance of as little as 4 meters, enabling targeted surveillance without unnecessarily covering adjacent areas. Perimeter protection standards “With the Panomera® S4 Perimeter we are setting a new standard in perimeter protection: where previously several cameras, complex infrastructure, and costly analysis were necessary, now a single system every 200 meters is sufficient,” says Thomas Reisinger, CTO of Dallmeier electronic. “Our specially trained perimeter AI reliably detects even the most challenging scenarios, such as crawling people in camouflage or complex manipulation attempts. This is a real revolution in the field of perimeter security, especially for operators of critical infrastructures and organizations that are directly or indirectly affected by NIS-2 and the other CRITIS directives.”
Cohesity, a pioneer in AI-powered data security, announced an expanded strategic partnership with CrowdStrike to strengthen threat detection and response. This partnership combines Cohesity’s robust data protection capabilities with CrowdStrike's world-class threat intelligence feeds, setting a new standard for comprehensive cybersecurity in backup and recovery solutions. Other advanced technologies The partnership is leveling the playing field against sophisticated cyber threats According to CrowdStrike’s 2024 Global Threat Report, adversaries have shifted to more effective tactics, such as credential harvesting and exploiting vulnerabilities, bypassing legacy defenses while using AI and other advanced technologies to rapidly evolve their techniques. Through the latest integration between Cohesity Data Cloud and CrowdStrike Falcon Adversary Intelligence, the partnership is leveling the playing field against sophisticated cyber threats. Latest intelligence on emerging threats Cohesity’s data protection solution, combined with CrowdStrike’s industry-pioneering threat intel feeds, which tracks over 250 adversaries and incorporates indicators of compromise (IOCs), enables mutual customers to identify the latest threats in their backup copies with higher fidelity and accuracy. The powerful combination offers greater visibility into the attack by providing the latest intelligence on emerging threats while minimizing the attackers’ advantages. Cohesity backup copies Threat hunting on Cohesity backup copies allows customers to investigate stealthily and passively Threat hunting on Cohesity backup copies allows customers to investigate stealthily and passively so that adversaries or containment or response activities do not impact investigations. By implementing Cohesity’s clean room design and integrated tooling, customers gain specialized forensic capabilities to analyze malware, investigate breaches, and understand attack vectors without risking contamination of their broader IT environment. Disposal of cyber adversaries “Elevating your organization’s threat detection and response is crucial in today’s threat environment, especially with AI at the disposal of cyber adversaries,” said Craig Martell, Chief Technology Officer, Cohesity. “Secondary data estates offer a perfect opportunity for minimizing attackers’ advantages and, together with CrowdStrike, our customers can enhance their threat hunting and response and automate defenses across their security stack.” Latest joint efforts Cohesity focused on getting jointly the best of the security drive, letting clients choose the right solutions Cohesity is focused on bringing together the best of the security industry, allowing customers to choose the right solutions for them without sacrificing functionality or adding complexity. This flexibility allows for a more tailored security posture that can adapt to emerging threats and changes in the IT environment. “Our continued partnership with Cohesity and latest joint efforts reflect our shared commitment to cyber resilience,” said Daniel Bernard, chief business officer, CrowdStrike. Security insights Bernard added: “To stay ahead, enterprises benefit from streamlining threat intelligence and response efforts while also harnessing their vast secondary data to gain security insights. This integration provides the technology and intelligence they need to reduce risk.” By partnering with industry pioneers like CrowdStrike, Cohesity solutions can better safeguard organizations' digital assets in the dynamic threat environment.
Blackline Safety Corp., a global pioneer in connected safety technology announced the launch of a next-generation connected area monitor that advances gas detection and early hazard identification for companies and first responders, providing organizations and communities with unprecedented protection. EXO 8 portable area monitor The new EXO 8 portable area monitor to be unveiled September 16 at the National Safety Council (NSC) Safety Congress & Expo in Orlando, Florida is the only direct-to-cloud area monitor capable of detecting up to eight gases and gamma radiation. Ideally suited to large industrial organizations in the oil and gas, petrochemical, mining, water, and wastewater sectors, alongside fire-hazmat and homeland security associations, EXO 8 helps teams rapidly respond to incidents involving hazardous substances and ensure the safety of workers, first responders, the public and the environment during these events. Situational awareness Automated analytics provide insights into incidents after the event, enabling teams to understand Real-time connectivity provides situational awareness that can be shared amongst all responders. Automated analytics provide insights into incidents after the event, enabling teams to understand what happened and take proactive measures to improve safety. Key features Building on the feature set of Blackline's award-winning G7 EXO including drop-and-go setup, direct-to-cloud connectivity, up to 100-day battery life, and comprehensive analytics, the new EXO 8 includes: Gas expansion module – the ability to add up to four additional sensors for a total of eight gases. Integrated gamma radiation sensor – with a range that’s three times the distance of competitors and that operates continuously without cycling on or off. Higher resolution full-color dual display – with live readings screen for real-time gas and gamma levels and dashboard screen to quickly see alarms and device status. Improved durability – enhanced ruggedness and reliability in even the harshest environmental conditions. Gamma detection Chris Johnson, Hazmat Technician for the Westchester County Department of Emergency Services in New York State, sees the value EXO 8 with gamma detection brings to hazmat response. “Blackline Safety’s G7 EXO was already my preferred area monitor in the field. The ability to quickly swap out gas sensors to adapt to whatever threat we’re facing during response is invaluable. The data you get from the device in real-time, from anywhere in the world, and easily understandable—has been critical to successful incident response,” Johnson said. Event protection “EXO 8 with gamma detection will help us in even more scenarios, including behind-the-scenes monitoring. Gamma allows us to use the device for public safety as part of event protection. It will also keep our people more protected because we can detect more gases,” Johnson continued. Event protection is crucial to public safety, as mass gatherings are vulnerable to attacks and are considered soft targets because they can inflict high numbers of casualties. Bomb detonation In 2002 U.S. officials stated they detained an American citizen who intended to detonate a dirty bomb Though there has never been a Radiological Dispersal Device (RDD, aka dirty bomb) detonated in a public setting, in 2002, U.S. officials stated they detained an American citizen who intended to detonate a dirty bomb. Since then, several governments in Europe have stopped similar plots by terrorist groups. According to the Global Terrorism Database, 68% of attacks on concerts and festivals involve explosives, including the Bataclan bombing in 2015 in France, the Manchester Arena bombing in 2017 in the UK, and the threats of mass casualties that canceled Taylor Swift’s Eras tour shows in Vienna. Real-time connectivity “Four years ago, we introduced the G7 EXO with Blackline’s industry-pioneering real-time connectivity, which quickly became the gold standard for area monitoring,” said Cody Slater, Blackline Safety CEO and Chair. "With EXO 8, we’ve significantly expanded our customers’ ability to protect people and communities across a wider range of situations." Full warranty and purchase options “We’re responding to a direct need in the market by providing organizations with more robust technology that helps them address a broader spectrum of risks, faster.” EXO 8 comes with a full warranty and flexible purchase options that include the ability to own or lease to maximize CAPEX or OPEX budgets. The first product shipments are scheduled for November 2024.
Expert commentary
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centers empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centers Real-time crime centers (RTCCs) serve as centralized hubs where dedicated personnel leverage pioneering-edge technologies to analyze diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centers provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centers provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and license plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralize a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centers is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. License Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyze video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorized intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualize events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information Center (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionizing RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their locationThe proliferation of RTCCs across the United States with over 80 centers in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centers are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and license plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The center has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyze historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorized access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centers during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralized hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyze vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning are essential to ensure these centers operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centers become more prevalent, they will play an increasingly vital role in helping agencies maximize their resources and make informed decisions, ultimately contributing to safer communities for all.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognize the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorized access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organization in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organizations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialog and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organization so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organization. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of machine and deep learning algorithms to recognize or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the color of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors Analytics, on the other hand, refers to the process of analyzing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behavior. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognize. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behavior information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilized. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organization. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realize that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the color of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognize something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognize unique, customizable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organization might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognize that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernize and digitize the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalizes the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet Impacting Credentialing Trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office, and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licensing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of Adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables the transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilize Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organizations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centers, office and residential buildings, airports, hotels, resorts Physical locations include data centers, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID, or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables the use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimizing security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Sharry, a global workplace experience platform built around digital employee badges, has successfully delivered its enterprise solution to London’s new international hub opened by PATRIZIA, a global real estate investment manager. The state-of-the-art mobile access leverages Gallagher Mobile Connect credentials and, through full integration with the Gallagher Command Center access control system, enhances physical security and significantly improves the workplace experience. PATRIZIA’s international hub Located in London’s Endell Street, PATRIZIA’s new international hub was opened after an extensive brown-to-green refurbishment that delivers sustainable ‘office of the future’ combining smart building tech, wellness amenities, hospitality services, street art, and flexible workspaces. The five-floor hub brings together PATRIZIA’s 200 UK-based employees. Their access to the existing Victorian building is completely managed through the PATRIZIA App and web-based PortalWX developed by Sharry. The workplace experience platform is fully integrated into the Gallagher Command Center access control system allowing users to unlock their office doors simply and quickly by presenting their smartphones. Innovative approach If an employee arrives from another office, they can generate a mobile access badge in the app in seconds “PATRIZIA’s employees in London and those visiting from our other offices can enjoy seamless and touchless mobile access to our new international hub in London’s Covent Garden,” said Shreya Sheth, Associate Director, Building Technology & Sustainability at PATRIZIA. If an employee arrives from another office, they can generate a mobile access badge in the app in seconds. There is no need to send a new badge request, pick up the plastic card in person, or wait for it to be sent, and think about returning it when they leave. This innovative approach saves time while strengthening security policy. Next-generation security solution “We are very excited to be supporting PATRIZIA with their new innovative London office. Their commitment to creating a flagship workspace for the future of work is truly inspiring. It's been an incredible honor to be able to support them with a smart workplace app and integrated access control solution for the space,” said Ondřej Vodňanský, Head of Sales EMEA at Sharry. “We are thrilled to collaborate with Sharry and PATRIZIA to deliver a next-generation security solution at their new London hub. By integrating our Mobile Connect credentials with Sharry's workplace platform, we've created a seamless and secure access experience that not only enhances security but also aligns with the modern, flexible work environment that PATRIZIA envisions,” said Gordon Swallow, UK Sales Manager at Gallagher Security. Enhance experience and operations Beyond mobile access, the PATRIZIA App offers users a comprehensive set of features designed to enhance their workplace experience. To name a few: Reservations: Employees can easily reserve shared workstations or book access to the Health Club. Service Requests: With one tap, users can request any service or maintenance through the app. Guestpasses: The app also simplifies visitor management by allowing users to invite guests to the building and send them a guestpass with all the necessary information. Integrated access control solution Sharry provides an efficient platform for managing workplace access and offers powerful tools For facility and office managers, Sharry provides an efficient platform for managing workplace access and offers powerful tools for communication and engagement with all users, including the ability to send news updates, polls, and event invitations straight to the mobile app. Sharry and Gallagher's integrated access control solution significantly enhances physical security in many areas. For example, a manager can remotely revoke any mobile or plastic badge with just one click in the PortalWX. Even the end-user can immediately report their plastic card as lost in the PATRIZIA app and thus suspend it. The Building Operating System Finally, managers can access real-time data on workplace occupancy, enabling more informed decisions regarding space and amenities utilization thanks to a partnership with Trigrr. The building operating system Trigrr has been deployed in PATRIZIA HQ to simplify system integrations and provide a centralized tool that unifies data, automation, and controls across Sharry, HVAC, IoT, and lighting. Thanks to Trigrr BOS, occupants can remotely control office room temperature, adjust lighting, monitor CO2 levels, or launch smart scenarios directly in the Sharry workplace platform. "Partnering with Sharry on the new PATRIZIA international hub is a fantastic opportunity to generate more value by combining all applications and systems into a flexible tool that can adapt building behavior in real-time according to the needs of the occupants," said Jean-Michel Verhulst, CEO of Trigrr.
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure, and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. Mobile-ready HID Signo readers The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over two years by a specialist security installer, Scottish Communications Group. In addition, the University has purchased 10,000 HID Mobile Access licenses to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. Safe and secure modern system “We wanted a modern system which is safe, secure, and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. “Complying with forthcoming legislation was also another important project requirement." "With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we must protect to ensure everyone is safe. The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” University of Dundee A thriving institution with ambitious development plans, it is currently building a new £40 million facility The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering, and life sciences. Based in the heart of the city, it is home to over 16,000 students, and 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organizations flexible laboratory, meeting, and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. Touchless smartphone entry The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP [Open Supervised Device Protocol] and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers thereby speeding up the rollout. University's challenges Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week when some 2,500 – 3,000 undergraduate and postgraduate students enrolled. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Mobile Access Shifting to HID Mobile Access completely changes this and delivers wireless credentialling Shifting to HID Mobile Access – which utilizes cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licensing, allocation of credentials, setting of building access rights, and validating or revoking of IDs – all of which are done virtually and remotely. Mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Dual system approach While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach is to operate a dual system. “We recognize that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO DTC4500e printers FARGO range integrates easily with the AEOS software so that Student Services staff can issue physical IDs Given RFID cards are still required, the University of Dundee utilizes its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. “HID Signo readers are going in now across the main buildings including the Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. Encryption, communications, and authentication standards “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications, and authentication standards." "Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” Motorola MOTORTRBO Ion smart radios In addition, the Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems, and CriticalArc Safezone® App, security staff need to carry only a single device to fulfill their duties.
Located in the French suburb of Talence near Bordeaux, within a 15-hectare estate, the Center for Resources, Expertise, and Sports Performance (CREPS) of Bordeaux is a local public training institution specializing in sports and youth training. The institution, which hosts nearly 450 athletes across 25 training areas, chose Hanwha Vision and its cameras to assist coaches in the training and preparation of athletes. The objective Enhancing athlete performance with video analysis The CREPS of Bordeaux regularly welcomes delegations of French and international athletes who come to prepare for major events, such as the Olympic and Paralympic Games, World Championships, and European Championships. To improve athletes' performance, video intelligence is used by the institution, offering athletes the ability to review their training sessions, playback actions, and complete recordings of their sessions for later analysis. The challenge was to find cameras with a performance level that met the different requirements of various sports disciplines. Challenges at Bordeaux's Fencing Hall This camera is needed to ensure image quality without distortion and with precision, particularly for saber fencing In the CREPS of Bordeaux's fencing hall, which hosts Olympic and world medalists for training, the most challenging task was finding a camera capable of capturing the entire combat area, including 14-meter-long pistes with little space for positioning. This camera is needed to ensure image quality without distortion and with precision, particularly for saber fencing where bouts often occur at the ends of the piste. The solution Implementation of high-resolution 180° panoramic multi-sensor cameras E-Novon, a company specializing in sports video and a long-time partner of Hanwha Vision, tested different types of cameras in real situations to meet coaches' needs. "After analyzing with the coaches, the PNM-9022V camera was the most suitable due to its angle with minimal guaranteed distortion," according to Romain Briffa, Director at E-Novon. Offering a 180° view reconstructed from four high-resolution video sensors, this camera provides a highly detailed image across its entire field of view, without distortion. Additionally, it requires very little space behind the filmed scene. Conclusion and results CREPS enhances its cutting-edge video tools for greater efficiency After evaluating several solutions, Cyril Faucher, Coordinator of the Performance Support Mission within the high-level department of CREPS, concludes, "Due to the quality and fluidity of the images, the solution provided by E-Novon and Hanwha Vision fully satisfies CREPS in optimizing training in the fencing hall." Currently being deployed for fencing and modern pentathlon training, this solution opens up promising perspectives due to the insights being made available, including tracking fencers on the piste, providing statistics, and more.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Center Heathrow deployed Genetec Security Center to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Center to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic license plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Center supports 90 other stakeholder groups working across 110 control rooms Genetec Security Center now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customized dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
In 1899, the Texas Legislature authorized the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers, but over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus that is home to 267 buildings, as well as an additional 5,038 acres of recreational, instructional, farm and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Electronic key control systems Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013 – marking the 16th consecutive year of enrollment growth for the university. Texas State reviewed its security policies and chose the need to execute electronic key Anticipating major physical and population growth to continue into the future, Texas State reviewed its security policies and determined the necessity of implementing electronic key control systems in sensitive areas. Based on its size, the understanding was that as many as 85 of these systems could potentially be needed as part of this initiative. Aggressive construction campaign Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. To accommodate the growing ranks of on-campus residents, the university has pursued an aggressive construction campaign, building a new residence hall complex every two years to house approximately 600 additional students with plans to break ground this fall on a third new housing complex. In all, Texas State spent more than $190 million on new or renovated buildings, with more construction planned into the foreseeable future. Update key management policies Maintenance staff members would often reach for the key to a particular building they needed to access With a large number of individuals requiring access to so many facilities, the university recognized that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” Kyle Estes Associate Director of Housing for Facilities Services Texas State. Options for key management systems To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. At the conclusion of its review of key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. This exhaustive process involved gathering research from printed materials and online research The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Enterprise management capability Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. The department also operates a facilities service group consisting of 110 full-time employees Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities, says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings. Centralized management features “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralized control parts fed by the system’s web capabilities All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralized management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. One particular feature, the ability to access the system from anywhere, has made the system even more effective, Estes says. Earliest adopters of KeyWatcher Touch As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered in a timely manner."
Named one of Money magazine’s Best Colleges in America 2023, Fairfax-based Geoge Mason University (Mason) is the largest public research university in the Commonwealth of Virginia. Its 10,000 faculty and staff provide classes and support services across three regional campuses, an international branch campus in Songdo, South Korea, and five instructional sites. With more than 40,000 students hailing from all 50 states and 130 countries and a six-year graduation rate that is well above the national average, Mason continues a rapid upward enrollment trajectory that saw headcount and credit hours increase by nearly 2 percent in Spring 2022 and Fall 2023 applications rise by 11 percent. R1 research university In addition to a heavy emphasis on diversity – U.S. News and World Report named it the state’s best public university for diversity and innovation – Mason is a pioneer in technology and research with 40 percent of its students majoring in STEM fields. It is also the youngest nationally ranked R1 research university, a top 10 public university for cybersecurity programs, and a top 20 public university for five different engineering and education online programs. University's challenge Providing an exceptional experience had to balance with the need to maintain public access to appropriate services Mason’s rapid growth requires it to embrace system-wide innovation, particularly when it comes to providing a safe, secure university environment for students, faculty, and staff. Providing an exceptional experience had to balance with the need to maintain public access to appropriate services, as well as the convenience of contactless entry and the ability to act quickly when credentials were lost, or stolen or the user’s status with the university changed. Goal “We have a very open campus. Most of our doors are unlocked from 7 AM until 11 PM and we have a public library, so we need to make sure access control isn’t in the way. On the other side, we need to make sure that if something does happen, we can react quickly to unfolding scenarios,” said Daniel W. Anthes, Director of Technology Services, at George Mason University. “The goal is to make it safe, easy, and seamless for people to navigate campus.” Case study Mason had already implemented a card-based access control solution featuring HID® Seos credentialling technology, HID OMNIKEY® chips, HID Asure ID card printing software, HID FARGO® printers, and HID Signo™ card readers. Photo identification cards were encoded with appropriate credentials allowing the holder to access everything from parking to residence and dining halls to facilities and services, including data centers, libraries, and shops by simply tapping or swiping. “Eventually, we reached the point that the switch to mobile credentialling was a straightforward next phase. This would make it easier for staff and students to get where they needed to be without having to fumble with a set of keys,” said Anthes. HID's solution HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential Mason again turned to HID and Atrium, deploying the HID Mobile Access® solution with Seos as the underlying credential technology. Atrium provisions and manages the lifecycle of the HID Mobile Access credentials. HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential to securely access doors, gates, networks, and more. It significantly increases convenience and boosts operational efficiency without compromising security. HID Mobile Access Because Mason had Signo readers already in place, deployment of HID Mobile Access required just a simple upgrade. Importantly, while mobile access eliminates the need for physical access cards, the highly versatile Signo readers support the widest range of credential technologies via native Bluetooth, Near Field Communication (NFC), and Apple Wallet – meaning those who choose to can continue using their physical ID cards until they are ready to transition to mobile access. Seamless integration “Once you get them using the technology, at that point the realization hits that this phone access is awesome. Or you can use your Apple watch and never even pull your phone from your pocket. There are a lot of things you have to navigate when considering credentials." "Fortunately, the HIDand Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected. The seamlessness of the mobile credential and how quickly they can get where they need to be with their phone or wearable is cool to see in action,” said Anthes. Final results Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus In addition to access to approximately 7,000 doors across its campus locations, Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus cash register, printer, copy machine, and retail and recreational facility. Mobile access will increase the convenience factor exponentially for students, for example enabling express check-in for residence halls at the start 2024-25 school year which will let students bypass queues that in the past were hundreds deep and go straight to their dorm rooms. Mason Mobile ID Mason Mobile ID has also driven a significant drop in the issuance of temporary and replacement cards, saving both the university and students time, money, and frustration. Students can also easily switch credentials to a new wearable or mobile device, eliminating the need to have this done in person – a significant convenience when Apple released its iPhone 15 shortly after Mason transitioned to mobile access. Safety standpoint “We are only two months in, so there are a lot of benefits we have yet to see with Mason Mobile ID, but I’m excited about what we’ve already started noticing in terms of students engaging faster with their peers and community." "The police department also absolutely loves the wearables from a public safety standpoint, because they can get through the doors a whole lot faster than they could with the traditional cards or when they had to fumble with keys,” said Anthes. Operational efficiency Going forward, Mason is exploring expanding mobile access to shuttle buses, which would also allow them to track utilization data, and for more special events access. “New technology like mobile access is how Mason improves operations, so if there is an opportunity, I will certainly push to have HID involved. There are a lot of things you have to navigate when considering credentials. Fortunately, the HID and Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected,” said Anthes.
Round table discussion
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might be suspicious, but the situation is different if they are yelling for help. Furthermore, audio enables operators to talk remotely to people on site, which can deter crime, de-escalate situations, or gather information. And yet, optimizing audio is often an overlooked aspect of physical security system design. We asked this week's Expert Panel Roundtable: What is the expanding role of audio in today's physical security systems?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionize physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?