3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European mar...
Virtualization offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged Infrastructure Solution “ISC West attendees were...
Keyfactor, a provider of secure digital identity management solutions, announces the launch of Keyfactor Control 6. This newest release of the company’s flagship, end-to-end secure identity platform addresses scalability in connected device security. Keyfactor Control secures, authenticates and future-proofs IoT identity at every step of the device lifecycle, providing a scalable IoT security solution. “The threat landscape is changing – trends like IoMT are creating new secur...
IdenTrust, (part of HID Global), the provider of digital certificates, and Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), announces a strategic alliance with a vision to provide trusted identity lifecycle management for enterprises on their digital transformation journey. Device certificates have traditionally been used to secure routers, firewalls, servers, and other devices capable of securely handling private keys and implementing...
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings,...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated Systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel has been established as the industry leader in integrated intelligent communications. Our companies have had a long-standing relationship where integration was valued, but we believe it is now time to go beyond simple integration to providing a full-service solution.” According to Barnard, RS2 Technologies has a reputation as a “one-stop” solution for the access management needs of customers in a wide variety of applications. RS2 delivers cost-effective access management solutions to customers in industries as diverse as shipbuilding, energy, hospitals, education, defense, banking, government (federal, state and municipal), museums, and a variety of diverse manufacturing companies. From small office buildings to large industrial facilities, RS2 has the products to meet the needs of business and industry. RS2 is known for having a rich feature set, continuous integrations, and the lowest total cost of ownership Intelligent Communication “The Intelligent Communication market is targeted to exceed $150 billion by 2021”, said Jim Hoffpauir, President, Zenitel Americas. “To continue to provide innovative solutions that exceed our customers’ expectations, we are creating new strategic partnerships with complimentary technology leaders in the security industry. With our recent release of the new IC-Edge system, partnering with RS2 provides Zenitel with sales channel alignment to emphasize smaller system sales, providing organizations of all sizes an easily accessible and cost-effective solution for highly intelligible audio.”
Identiv, Inc. announces that it will present its recently expanded Internet of Things (IoT) product portfolio at ISC West 2019, encompassing a wide range of physical and logical access control, video and data analytics, door readers, identity cards, visitor management, mobile security, telephone entry, and radio-frequency identification (RFID) and near-field communication (NFC) solutions for physical and IT-secured businesses. Identiv will be showcasing demos of its complete portfolio of high-performance IoT solutions for government, banking, healthcare, critical infrastructure, retail, and other industries at ISC West 2019, booth L13. Newly Acquired And Developed Solutions The company will have some of its newly acquired and developed solutions on display, including: Enterphone integrates with Freedom and Liberty and will be introduced to the U.S. market for the first time at ISC West Web/Cloud and IoT-Based Architecture - Newly acquired Freedom and Liberty Access Control product lines provide cloud-based, frictionless, cyber-secure access control. Freedom’s software-defined platform and new mobile app enable IoT-driven access control for enterprises and governments. Liberty provides an entry-level, web-based scalable solution for small-to-medium businesses (SMBs). Video and Data Analytics - 3VR by Identiv’s video intelligence solutions provide a single platform for real-time security, analytics, and consumer insights, allowing organizations to protect their employees, customers, and assets, as well as enhance store operations and shopping experiences. 3VR is now fully integrated with Hirsch Velocity. Mobile Security - Thursby by Identiv software solutions provide strong government-grade security for government agency, enterprise, and personal mobility, supporting bring-your-own-device (BYOD) and two-factor authentication (2FA) on mobile devices. Access Control - Identiv’s new Hirsch Mx-1-ME (Metal Enclosure) Controller manages a single fully supervised door for controlled entry and exit at the edge and is protected by a metal enclosure with battery backup and power supply. Phone Entry - Over two million tenants in 35,000 installations within residential and mixed-use properties depend on the Enterphone by Identiv telephone entry system for secure visitor access. Enterphone integrates with Freedom and Liberty and will be introduced to the U.S. market for the first time at ISC West. Secure IoT Tags - Identiv’s high-frequency (HF) and ultra high-frequency (UHF) transponders bring smart identities and security to the IoT, digitising and enabling high-growth applications, like medical devices, athletic apparel, and pharmaceuticals. Identiv’s new Tamper Detection NTAG 424 DNA Tag strengthens IoT security for anti-counterfeiting, document authentication, supply chain traceability, data access, and customer engagement. Physical Security Industry This year, join Mark Allen, General Manager, Physical Access Systems at Identiv, Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions (DSS), and Joe White, President at A-1 Lock, as they present “In Between the Lock and Controller: Why Wireless Locks Are Changing the Game in Access Control” during ISC West on 11th April, 2019, 11:00 AM – 12 PM (IST). The International Security Conference and Exposition — also known as ISC West — is the largest event in the U.S. for the physical security industry, covering access control, alarms and monitoring, biometrics, IP security, video surveillance/CCTV, networked security products, and more.
Metrasens, a provider of advanced ferromagnetic detection technologies, announced that it will be unveiling the next generation of its mass casualty threat detection solution, Proscreen 900 Plus, at ISC West 2019 in Las Vegas. The new solution bolsters Metrasens’ impressive ferromagnetic screening product line and provides a higher level of security for stadiums, arenas, event venues, hotels, campuses and other areas where security is paramount. Proscreen 900 Plus demonstrates Metrasens’ commitment to innovation in the security sector and focus on delivering screening and detection technology backed by rigorous weapons testing and analysis. The result is high throughput, highly effective detection of large mass casualty threat items without the burden of divestiture. Proscreen 900 Plus helps mitigate the damage potential of bad actors in a mass casualty attack, and is ready to deploy today"In detailed weapons testing against a series of long barrelled firearms, the dual-screening methodology of Proscreen 900 Plus demonstrates an unmatched detection rate and throughput rate of 50-60 individuals screened per minute (3,000–3,600 per hour). With Proscreen 900 Plus, the screeners are placed at the outer perimeter of a facility or venue, detecting potential threats before any attacker can reach security chokepoints. Innovative Technology To Protect People “We live in a time where security for facilities and event venues has never been more important,” said Jim Viscardi, Metrasens Vice-President of Global Security. “Proscreen 900 Plus helps mitigate the damage potential of bad actors in a mass casualty attack, and is ready to deploy today. Our goal at Metrasens is to use innovative technology to protect people as best we can. With Proscreen 900 Plus, we are taking another step forward to making the world a safer place.” Maintaining Metrasens’ signature portability and battery-powered operation, Proscreen 900 Plus is a versatile solution for use in a wide variety of CONOPS. Customers will benefit from Metrasens’ high level of support, including site evaluations and assessments in working with partners and their business. Proscreen 900 Plus offers unobtrusive integration into surroundings so as not to disrupt the atmosphere In addition to detection capabilities and deployment versatility, Proscreen 900 Plus offers unobtrusive integration into its surroundings so as not to disrupt the atmosphere of its environment. This feature will appeal particularly to customers where subtlety is essential in maintaining a positive guest experience. Deployed For Healthcare And Data Security Metrasens is a pioneer in the use of ferromagnetic detection technology in commercial products and continues to produce innovative solutions with deep expertise in ferromagnetic technology development. Metrasens ferromagnetic technologies have been deployed in 46 countries across a variety of markets, including corrections, healthcare and physical data security. By striving for excellence in its mission for safety, the Metrasens team considers its innovation in security solutions to be more than just a job. Interested parties can visit Metrasens at ISC West 2019 at the Sands Expo Center in Las Vegas from April 10-12, booth #11143. Metrasens will be providing hands-on demonstrations of Proscreen 900 Plus. It will also be exhibiting its award-winning physical data security solution, Proscreen 500, which is ideal for data centers and government facilities to combat data theft.
Qognify - the trusted advisor and provider of physical security and enterprise incident management solutions, is exhibiting at ISC West and demonstrating to more than 1,000 organizations around the world, how Qognify solutions are safeguarding people, infrastructure and business operations. At booth 13074, Qognify’s team of subject matter experts will advise security practitioners on how they can maximize the outcomes of their security strategies. Attendees at the ISC West International Security Expo, being held at the Sands Expo Center will benefit from insights they can apply to maximize their organization’s security strategy, whether in education, critical facilities, finance, healthcare, logistics, manufacturing, retail or transportation sectors. Qognify’s field-tested solutions have demonstrated maximum value to customers who place a premium on physical security. Incident Management Solutions Qognify applies a consultative approach to building solutions for customers, as opposed to recommending off-the-shelf products Qognify applies a consultative approach to building solutions for customers, as opposed to recommending off-the-shelf products. The company works with customers to understand their organizations’ strategic goals, along with any specific needs based on industry or legislative requirements. Assessing each scenario individually in this collaborative process, has resulted in system solutions that have quantifiably increased the security and operational efficiencies in enterprises. Qognify CEO and President, Steve Shine states: “Customers with complex physical security requirements, or systems that are dictated by strict regulations, or even those with specific needs based on their particular industry have realised optimized outcomes with Qognify solutions.” Shine adds: “Our software solutions reach beyond traditional safety and security applications and deliver far reaching and quantifiable value to the customer across many industries and use cases – even in unexpected areas that may surprise.” Qognify invites visitors of ISC West to visit booth 13074 to learn about how Qognify provides added value and unique physical security and incident management solutions to customers.
At ISC West 2019, ASSA ABLOY will highlight its commitment to helping security professionals stay ahead of industry trends and innovation for their clients. ASSA ABLOY’s Booth (#8061) will feature cutting-edge solutions that help security professionals across industries navigate what’s next in access control. “At ASSA ABLOY, we’re focused on helping our customers prepare for the future so they can build a safer, smarter and more seamless business,” said Peter Boriskin, Chief Technology Officer at ASSA ABLOY Opening Solutions Americas. “We’re excited to share the products that allow us to help security professionals open what’s next in the industry.” Unattended Package Delivery At its booth, ASSA ABLOY will display new innovations in access including: Unmanned Critical Infrastructure: ASSA ABLOY will highlight ways to ensure the security of critical infrastructure that is often unmanned or unsecured. One such example is Intelligent Traffic System (ITS) cabinets that are vulnerable to risks ranging from vandalism to malicious physical and cyber-attacks simply because they aren’t adequately secured. Mobile Credentials: Mobile is already a crucial part of people’s everyday lives. With the shift to mobile, ASSA ABLOY is supporting the growing adoption of mobile credentials and making strides in capabilities by integrating with key strategic partners. Unattended Delivery: The security of unattended package delivery has given rise to a new set of challenges and opportunities. Booth visitors can learn more about ASSA ABLOY’s newest addition to the family, Luxer One, a locker technology company, and how smart lockers can be used as a package delivery solution. Intelligent Key System “These advances are the result of our continued commitment to developing solutions that improve security, safety and convenience for our customers,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “The innovations on display at ISC West are just the start of what’s coming down the pike as we explore new opportunities in the market.” Various Markets And Technologies The booth will also showcase new expansions in ASSA ABLOY’s product lines for various markets from education to healthcare, as well as the latest technologies, including: The Securitron M380E Magnalock, which provides a strong hold, an optional integrated REX, sleek design and easy installation with a new strike mounting template. The Adams Rite G100 wireless digital glass lock with Aperio technology, which makes extending access control to all-glass doors easy and affordable while maintaining aesthetics. The latest Attack Resistant Door Solutions, 2019 Secure Campus Award and 2019 Govies Award winning technology designed to delay intruder entry. The Medeco XT Traffic Cabinet Lock, 2019 Govies Award winning technology designed to secure critical infrastructure with 27/4 security and access through an intelligent key system.
Pelco by Schneider Electric, the trusted global provider of end-to-end video security solutions, will be exhibiting products, solutions, and services for several market segment applications at ISC West 2019, held in Las Vegas from April 10-12. Pelco will lead with its forthcoming cloud-enabled video surveillance service for commercial and enterprise scale deployments as part of its phased delivery of capabilities and services that ties Pelco’s VMS, VideoXpert, into their cloud-based architecture. Today’s video surveillance as a service (VSaaS) limits broader customer and system integrator adoption with a common set of challenges. These include economic, technical, regulatory, and perceived risk concerns. Pelco’s pragmatic vision and architecture address these issues as voiced by both current cloud users as well as system integrators. VideoXpert Plates Analytics, ANPR System Pelco will showcase products such as VideoXpert Plates analytics; a Pelco VideoXpert-compatible, ANPR systemPelco will also showcase soon-to-be-released products such as VideoXpert Plates analytics; a Pelco VideoXpert-compatible, Automatic License Plate Recognition system and the GFC Professional Multi-Camera Series, a multi-directional IP camera line that provides targeted coverage from a single location. Pelco’s commitment to 4K imaging will be on display with the GFC Professional 4K and Spectra Professional 4K cameras along with platform enhancements for VideoXpert Video Management System (VMS). In addition, the new VxCare Professional Services, a bundled three-tier service plan for VideoXpert Professional and Enterprise systems, will be represented. Pelco will showcase solutions in multiple vertical markets such as healthcare, smart city, commercial/hospitality, banking/finance, education, and others. Cameras On Display The Evolution camera series, the Spectra Enhanced, the Esprit Enhanced cameras, the Optera 270 camera will be on displayThe Evolution camera series (ultra-wide-angle panoramic monitoring), the Spectra Enhanced and the award-winning Esprit Enhanced cameras, the Optera 270 camera (seamless panoramic view), and the High Security Corner Mount IBD camera will also be on display. For hands-on, real-time demos visit Booth #20031. Robert Beliles, Pelco’s Chief Marketing Officer, gives a sneak peek into what Pelco is bringing to the table at ISC West 2019. Pelco’s Director of Segment Marketing, Stuart Rawling, will present 'Gearing Up for an Automated Revolution' which will cover how the security business will be impacted by the current technology revolution. Mr. Rawling’s presentation will take place in the Sands Convention Center on Thursday, April 11, from 11 a.m. - 12 p.m. local time.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
The best route to greater adoption of robotics in the field of physical security is intellectual honesty, says Travis Deyle, CEO and co-founder of Cobalt Robotics. “Robots are not a panacea, so we must be clear and honest about capabilities and use cases,” he says. “If you are dishonest, people will lose faith. We must have clear expectations about what’s feasible today and possible tomorrow.” The robotics tide is turning in the security market, which is notoriously slow to embrace new technologies. “The tone has changed at recent security events,” says Deyle. “Previously, robots were thought of as a science experiment. But now, there are big-name users wanting to discuss proof of concept. It has evolved from being a novelty to now it’s time to give it a serious look. They want us to help them sell the concept up the chain of command. It’s helpful to have conversations with other parts of the company because it has an impact on the culture of the company.” The robotics tide is turning in the security market, which is notoriously slow to embrace new technologies Cobalt’s robots are purpose-built for a specific use case: Providing after-hours support and security for corporate locations. Indoor environments, confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response. Cobalt's Human-Centered Design Cobalt’s robots also interact well with people. They are friendly and approachable and make employees feel safe and secure. The human-centred design promotes that interaction, and a real person (located remotely) can enter into any interaction instantly as needed. “We combine machines with people,” says Deyle. “We allow the machine to do what it does best, such as dull and boring activities, and add the flexibility and cultural relevancy of having a person there.” Cobalt’s robots also interact well with people, they are friendly and approachable and make employees feel safe and secure When a robot is deployed, it performs a brief mapping phase (about an hour), in which it moves around and builds up a “map” of its space and develops its patrol route. Over time, it lingers more in areas where it encounters more incidents. There are 60 sensors on the robot, including day/night cameras, high-resolution thermal cameras, a card reader that integrates with the corporate access control system, a microphone, and environmental sensors for temperature and humidity. The robot builds models of what’s normal in its environment in terms of people, sound, motion, open doors and windows, and even leaks and spills. And then it detects anomalies and sends relevant notifications to Cobalt specialists, who respond and manage any events in real time. The machine provides unwavering attention, perfect recall, and accountability. Cobalt robots have been designed to help bridge the problems faced with utilizing guards and cameras Accommodating Various Anomalies The Cobalt robot is designed to blend into a high-end office environment, with flexible fabric and a corporate design aesthetic. It is stable beyond 45-degrees, so it’s hard to topple over. The 5-foot-2-inch robot can see over desks and cubicles. It is designed to bridge the gap between guards, who are expensive and underutilised during uneventful night shifts, and cameras, which are unable to respond to nuanced situations. Cobalt Robotics already has customers in defense, finance and manufacturing, and a handful of Fortune 500 companies are looking at the service Autonomous navigation uses artificial intelligence (AI) and machine learning to avoid static and dynamic obstacles. Over time, the robot accommodates various anomalies such as loud machinery noise, and “semantic mapping” adds intelligence to its map. When the robot figures out that a picture on the wall is not a real person, for example, it stores that information for future reference. The technologies enabling robotics in the indoor environment are mature – there have been variations of security robots in operation for decades. What has changed is the costs of the technologies, which are now inexpensive enough to make a robot affordable to businesses. Cobalt Robotics offers an all-inclusive service providing hardware, software, service and maintenance as well as the remote human interface. All together, the service is a third to half the cost of a man-guard, and it bills monthly, says Deyle. Cobalt Robotics offers an all-inclusive service providing hardware, software, service and maintenance as well as the remote human interface Cobalt Robotics already has customers in defense, finance and manufacturing, and a handful of Fortune 500 companies are looking at the service. They are currently operational in the San Francisco Bay area and Chicago and will be in six other geographies in the next three months (in response to customer needs). Uses include offices, museums, warehouses, technology centers, and innovation centers. A former Google employee, Deyle’s experience in robotics goes back to his Ph.D. studies at Georgia Tech, where he worked on developing a robot to deliver healthcare to homebound patients. Deyle and Cobalt Robotics co-founder Erik Schluntz departed Google in 2016 to form Cobalt Robotics. In just 12 months, Cobalt went from the initial idea to paid robot deployments.
More crowded aisles and productive conversations continued to set the tone on the second day of ISC West in Las Vegas. No big technology breakthroughs have surfaced, but there is plenty of interest, and some degree of curiosity, about whether (and when) the recent hype about artificial intelligence (AI) and deep learning will translate into usable products. Vertical Market Solutions “Yesterday we saw a tremendous amount of traffic in the booth, and today is more of the same,” said Miguel Lazatin, Director, Product and Channel Marketing, Hanwha Techwin America. The layout of the Hanwha Techwin booth is different this year, although the “footprint” is the same size. “We lessened the number of kiosks within the booth, which allows for better flow, and the ability to accommodate more customers and do the demonstrations more effectively and focus more on product solutions,” Lazatin adds. “We are introducing products in new categories for Hanwha Techwin,” Lazatin says. “We have new thermal cameras, new stainless steel cameras, new multi-sensor cameras, as well as new mobile products. We are expanding our product set to address new applications and new markets.” The new products are tailored and specific solutions for those new markets, which include food processing plants, oil refineries and areas where Hanwha Techwin has not played in the past. Although there is a lot of talk about deep learning and artificial intelligence at this year’s show, there don’t appear to be a lot of actual products being introduced in those categories. Companies of all shapes and sizes are embracing the new buzzwords, leaving some attendees unsure how these new ideas — or marketing concepts? — fit into the “real world.” Hanwha Techwin America lessened the number of kiosks within the booth, which allows for better flow Meeting Customer Needs With AI A key to leveraging the value of new technologies such as AI and deep learning is to get beyond the buzzwords and position the new capabilities in the context of actual end user benefits such as operation efficiency and automation, says Stuart Rawling, Director of Global Business Development, Pelco by Schneider Electric. “The customer doesn’t care about buzzwords, he just wants to know what are the benefits? What solutions are we offering?” At the show, Pelco announced a new alliance with IBM that will leverage Big Blue’s advanced knowledge of deep learning and analytics, and combine it with Pelco’s VideoExpert video management system (VMS). “We have a version of that integration at the show, but the real news is that we are merging our development plans to solve specific use case problems,” says Rawling. Video Analytics In The Cloud Cloud applications are also gaining traction, including the Avigilon Blue cloud platform. “It allows integrators to manage everything from one easy, central site,” says Willem Ryan, Avigilon’s Vice President, Global Marketing and Communications. “They can respond quicker and with knowledge of what the system is doing.” Video analytics are built in as an inherent part of our solution. Any IP cameras — Avigilon or ONVIF-conformant — become equipped with analytics when they are connected to the Blue platform. A new announcement at the show is Avigilon’s ACC System Health Monitoring, a new service added to the Blue platform. Health monitoring enables integrators to be more proactive in their service and keep systems running smoothly. “Cloud allows you to scale how you can manage systems and service systems rather than having to go on site to upgrade systems,” says Ryan. “People think it’s a buzzword, but really it’s a means to an end to make systems more secure, more efficient, more responsive. We’re putting a lot of investment in it.” A new announcement at the show is Avigilon’s ACC System Health Monitoring, a new service added to the Blue platform Building RMR For Customers The cloud also enables integrators to build more recurring monthly revenue (RMR). A cloud approach that encompasses products and ongoing service ensures that an integrator continues to “touch” customers. “For us, they can package this around service in a new way,” says Ryan. “The customer doesn’t have to worry about a large capital expense in the beginning. And as new capabilities come along, they can be added. So it becomes a way to sell a package around their company, service and products; but less about the products and more about a platform that allows them to sell their [integration] company in a new way. What we’re hearing is, it’s a change in mindset, and you need buy-in from the top of the organization. And the sales people have to get used to selling in a different way. It’s going to take time, and our industry needs to evolve. Customers love the flexibility. And integrators need stickier customers and better profit margins.” Avigilon also continues to upgrade its Appearance Search product to enable faster review of stored video. Now a search for video related to an investigation can begin with a physical description of a person (rather than using a reference image as a starting point in the search). There’s one more day for attendees to roam the aisles of ISC West in search of new and useful technologies. Foot traffic historically drops off on the final day, but that just leaves more quality time for interaction among those staying until the bitter end. Count me among that group, and I will have much more to report after the show ends.
With roots dating back to the year 1948, Italian pharmaceutical company Alfasigma is dedicated to advancing the state of healthcare under the company motto, ‘Pharmaceuticals with Passion’. Headquartered in Bologna, the multinational corporation was created in 2017 by the merger between Alfa Wassermann and Sigma-Tau. As a result, Alfasigma now employs about 3,000 people and markets a wide range of therapeutic drugs in 18 countries including the US, China, Russia and several European countries with annual revenues of EUR 1.06 billion. In order to keep up with the company’s ongoing evolution while emphasizing building protection, Alfasigma decided to update the infrastructure of its corporate offices in Milan and Bologna. This large-scale remodeling project also required updating the fire alarm, intrusion detection and video security systems at both facilities to the highest standards. Security Cameras For Outdoor Surveillance On the exterior of the buildings, FLEXIDOME IP starlight 7000 VR cameras were installed to provide 24/7 securityAssuming a long-term perspective, Alfasigma management headed into the project with three key requirements: First, saving cost by refurbishing already installed system components such as intrusion and fire alarm detectors. Second, accommodating for future building expansions and saving additional costs by installing a future-proof and scalable system. And third, adding around-the-clock security to the building’s exterior through modern security cameras built for outdoor use. For this reason, Alfasigma commissioned Bosch as the one-stop provider to equip the Milan office – home to the International Division – as well as corporate headquarters in Bologna with an IP-based solution. The video security set-up includes high-definition DINION IP 5000 HD cameras connected to recording stations and offering 1080p resolution images at 30 fps. On the exterior of the buildings, FLEXIDOME IP starlight 7000 VR cameras were installed to provide 24/7 security. Recording at 1080p and 60fps, the cameras incorporate starlight technology to deliver relevant images even in challenging light conditions. Extremely weather-resistant, water-tight and able to withstand high impacts, the cameras are highly suited for outdoor use, confirmed by IP66, NEMA type 4X and IK10 rating and installation in mission-critical environments such as airports and government buildings worldwide. MAP 5000 Installed With LSN Detectors The new fire alarm system is interfaced with the voice alarm system Plena via Smart Safety Link“The video surveillance products are excellent and have impressed me the most. We are very satisfied, above all, with the high quality of the products,” said Stefano Borsarini, Facility, Maintenance and EHS Manager at Alfasigma facilities in Bologna and Milan. The cameras are supplemented by the intrusion panel Modular Alarm Platform MAP 5000 installed with LSN detectors – a large portion refurbished from the legacy system – to safeguard Alfasigma’s offices at night. Fire alarm is provided by the Modular Fire Panel 5000 Series with four loops, processing signals from 190 fire alarm detectors and 28 manual call points. The new fire alarm system is interfaced with the voice alarm system Plena via Smart Safety Link thus optimizing the operational security via a monitored connection. Successfully installed and customized according to client specifications, the Bosch fire alarm, intrusion detection and video security solution maintains the safety of Alfasigma’s employees and property at both sites. It also fulfills the key customer requirement of accommodating for future expansions in a modular, IP-based system that is able to keep pace with Alfasigma’s rapid evolution as an innovative multinational company.
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access Control And Intruder Detection System In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety Of Staff And Visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers Smart Building Management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key Features Available With Inception: A web-based interface that can be controlled by authorized staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits For Client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorized access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher Single Access Card Control System Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Center Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Center central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast Facts About The Project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilized: Command Center Controller 6000 T-Series readers Tag Boards Car park Management
A total overhaul of care and safeguarding measures at Southern Health NHS Foundation Trust’s mental healthcare facilities was required following historic failures, including preventable deaths in 2012 and 2013. A root-and-branch reform program was put in place to improve care, ensure transparency and cut risks. A comprehensive video surveillance solution was sought to underpin these efforts. The first phase project required complete video capture and recording at the Ravenswood House facility for children and adolescents, with further premises to follow in subsequent phases. Affordable Surveillance System The surveillance system not only needed to cover all areas of the site but also needed to be affordable, secure against cyber-attacksSouthern Health had a critical need for continuous video evidence capture in all areas at Ravenswood House, in all lighting conditions, without blind-spots. The primary objective was to use the recordings of interactions with patients to improve standards of care, with clinical staff reviewing how incidents are handled, and protecting staff in the event of accusations of mistreatment. Because vulnerable young people are being cared for, any allegation of mistreatment requires that the staff involved are removed from front-line care duties pending investigations, therefore the ability to find and present video evidence quickly is vital. The surveillance system not only needed to cover all areas of the site but also needed to be affordable, secure against cyber-attacks in compliance with NHS requirements, quick to install – as the hospital had to remain in constant use – and easy for clinical staff to use as well as security specialists. Installation Of 12MP Super Fisheye Cameras The 12MP Super Fisheyes benefit from IDIS’s Smart Failover protection, which ensures continued recording even during network instability or drop-outHigh specification IDIS video technology was identified as the best for the project following a detailed on-site comparison which demonstrated its superior picture quality and ease-of-use. Specialist integrator ISD Tech was brought in to install more than a hundred IDIS 12MP Super Fisheye cameras. These units allow affordable, comprehensive area coverage, typically doing the equivalent job of three or four PTZ cameras. The result is lower installation fees, a reduced maintenance burden and affordable operation, recording the full scene without the need for an operator 24/7. The 12MP Super Fisheyes also benefit from IDIS’s Smart Failover protection, which ensures continued recording even during network instability or drop-out. And IDIS’s Korean-made technology uses proprietary protocols (not off-the-shelf) that makes it fully network-secure, allowing it to be linked to local LANs without the risk of system hacking, which is a key consideration for any IP surveillance solution. Easier And Less Costly Installation The impact on staff is huge when they can’t work in the wards, so this speeded-up process is really valuable"The IDIS video solution was used to quickly and easily replace a previously-installed IP video system which comprised a mix of equipment from different manufacturers, and in comparison, it is easier and less costly to install, maintain and operate. “This will really assist us with evidence gathering and any criminal process. We can now look at the footage ourselves and quickly determine what happened. And we can email video links to the police and local authority designated officers. The impact on staff is huge when they can’t work in the wards, so this speeded-up process is really valuable,” said Tracey Edwards, Head of Security Southern Health NHS Trust. Following ISD Tech’s successful completion of the Ravenswood House upgrade, 250 more facilities across Hampshire are to follow, including clinics, medium secure units and admin centers.
IDF Aluminum has installed transom closers, solenoid locks and hook locks from Alpro Architectural Hardware at a building in a historic section of London’s Finsbury Square. 4 Chiswell Street backs onto the Artillery Ground which has seen archery in Tudor times, some of the first organized games of cricket in the 1730s and even a hot-air balloon flight in 1784. The four-storey structure was refurbished by main contractor Parkeray to a design by Ben Adams Architects that created column-free office space with exposed concrete soffit and a signature golden mesh & grille facade based on curtain walling with bold circles. Automatic Voltage Regulation The glazing is unusual since the Reynaers’ curtain walling for the double-height reception uses innovative bracketry to support massive panes from Euroview Architectural Glass. The Alpro closers are on the distinctive gilt exterior doors and the client is also benefiting from solenoid bolts in the door heads. Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg, a bolt throw of 14mm and models with oversize pins. The advanced microprocessor module provides power reduction allowing for continuous operation without heat generation as well as automatic voltage regulation, dual monitoring and access control features to fully monitor and control movement. Installers can use housings from the same series for surface mounting which facilitates the securing of glass doors. Dress plates are offered for a clean finish. Public Sector Environments The 4 Chiswell Street refurbishment was carried out with tenants in occupation and even involved use of abseiling techniques to replace glazing. A temporary reception was created for access and egress. Daylight has been maximized and floor-to-ceiling height is used wherever possible in a design that meets the Equality Act and includes a revised fire strategy. IDF specialises in the design, manufacture and installation of aluminum doors. The door projects are often in business and public sector environments where usage may be high but maintenance costs must be minimised. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?