Healthcare security
Zenitel, a provider of intelligent critical communication solutions, is pursuing its growth strategy in the EMEA region and specifically in Southern Europe through the launch of a new Center of Excellence (CoE) in Spain. Zenitel has appointed its longtime partner in Spain, COINTEL SL, to this role in the Iberian market. Partnership with Cointel COINTEL SL, based in Bilbao, will consolidate Zenitel’s presence and will continue to build a strong and sound ecosystem network. Cointel b...
Security and Safety Things GmbH has announced the launch of its second App Challenge to spur additional creative development in video analytic applications. Through April 26, 2021, participating developers have the opportunity to submit proposals for apps to address specific security, safety and business optimization use cases in the retail, transportation, stadiums and entertainment, and healthcare verticals. S&ST open camera OS and IoT platform The apps will be designed to run on smart...
PAC, a supplier of innovative access control solutions, has announced new versions of its cutting-edge Access Central and EasiNet Residential software management platforms. The most comprehensive upgrades to both systems since they were initially launched, PAC has introduced a range of dynamic features that will enable commercial and residential premises to maintain high levels of occupant safety as lockdown begins to ease. ‘Access control technology has a significant role to play in help...
Combating the COVID-19 (coronavirus) pandemic is at the top of the global agenda and providing vaccine to populations around the globe means providing around 8 billion doses - with only one for every person in the world. In addition to the availability of the vaccine, a decisive factor in the race against time is the disposability of the glass vials. Medical-grade vaccine vials The glass must be resistant to a wide range of chemicals and temperature changes To ensure that the mass vaccinatio...
The ISEE & CEFE Powered by INTERSCHUTZ, co-hosted by Beijing Safever Science & Technology Innovation Center, China National Machinery Industry International Co., Ltd. (SINOMACHINT), and Hannover Milano Fairs Shanghai Ltd. will be held at Shanghai World Expo Exhibition & Convention Center on December 8 – 10, 2021. The exhibition area is expected to be 30,000 square meters, with an estimated 400 exhibitors and 20,000 trade visits. ISEE & CEFE Powered by INTERSCHUTZ This exp...
Paxton Access Inc. has launched the latest addition to their line of wireless access control solutions, the PaxLock Pro - Mortise, a smart lockset designed for quick and easy installation to conveniently secure external facing doors. Available in black or white fascia with an Eclipse or Galaxy handle, the PaxLock Pro - Mortise fits discreetly into a variety of environments. It is ideal for education and healthcare facilities, as well as commercial premises like corporate offices, warehouses, an...
News
Telos® Corporation, a pioneering provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations, and Omnilert, the innovation pioneer and most trusted partner in emergency communications, announced the integration of the Telos Ghost virtual obfuscation network into Omnilert Gun Detect, the industry’s AI-powered visual gun detection solution. “Adding network obfuscation and misattribution capabilities to Gun Detect enhances our ability to prevent loss of life in the event of an active shooter situation,” said Ara Bagdasarian, co-founder, Omnilert. “Blending Telos Ghost’s capabilities with our own allows for a more robust product, greatly increasing security.” Omnilert Gun Detect Omnilert Gun Detect reliably and rapidly recognizes firearms and immediately triggers multi-channel alerts and automated pre-defined safety protocols. With the integration of Telos Ghost, Omnilert is able to hide source locations and the destination information repositories in its network. Omnilert and Telos will jointly market and sell the combined solution to various markets, including education, healthcare, manufacturing, private and public sector organizations. “Mission is incredibly important to us at Telos, and we couldn’t be more gratified that our cybersecurity technology will be leveraged by Omnilert Gun Detect to keep people safe, and ultimately, save lives,” said John B. Wood, CEO and Chairman, Telos. “Integrating Telos Ghost into the company’s innovative visual gun detection offering will ensure safety and security.” In January 2018, Telos launched the cloud-based Telos Ghost network to provide security and privacy through obfuscation and encryption. The platform operates under the philosophy that one can’t exploit what one can’t see, enabling organizations to work securely over the internet without giving away their identity or their presence.
Device Authority, a global front-runner in Identity and Access Management (IAM) for the Internet of Things (IoT), announced KeyScaler for Azure Sphere in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Azure Sphere brings together Microsoft’s expertise in cloud, software, and silicon to provide a security foundation and connectivity to create intelligent secure products and accelerate the adoption of IoT at scale. Device Authority’s KeyScaler for Azure Sphere software platform has the ability to leverage this initial security foundation by enabling Azure Sphere devices to connect to KeyScaler and provide them with operational certificates to automate and secure device enrollment to the Azure IoT platform. Automate certificate management Device Authority continues to see an increase in the demand for security and management integrations with Microsoft Azure when customers are building and deploying their IoT strategy. KeyScaler for Azure Sphere has the required functionality to automate certificate management for Azure Sphere devices. These devices need to connect to different constituents including Microsoft and non-Microsoft assets in operations. KeyScaler is a key component in this ecosystem to extend the trust and automation and if required can support certificate-based authentication for any additional IoT applications. “We are delighted to launch our KeyScaler for Azure Sphere offering on Azure Marketplace today. We have worked closely with the Azure Sphere team to help solve their customer’s challenges with security lifecycle management, and now customers and partners can consume KeyScaler for Azure Sphere directly through Azure Marketplace as they develop their IoT projects,” said Darron Antill, CEO of Device Authority.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, is pleased to announce that Vanderbilt International (Vanderbilt Industries) has become the 50th member of its technology partner program. Vanderbilt’s ACTpro solution brings expertise to the Dahua ECO Partner Program and takes access control to the next level with video surveillance integration. Both companies look forward to enhance their partnership and explore future developments together. Dahua ECO Partner Program The Dahua ECO Partner Program was launched in June 2020. Since then, global and local teams have been committed to building a smart ecosystem with technological partners. Together with our ECO partners, we are able to provide the right solution to their demands" “End-users, system integrators and distributors can already feel the impact in the industries,” said Peter Pan, Global Technology Partner Alliance Director at Dahua Technology, adding “Together with our ECO partners, we are able to provide the right solution to their demands. It is great to have Vanderbilt International by your side in industries like healthcare, education, retail, government and others. We are enthusiastic to create more value together.” ACTpro access control system ACTpro is Vanderbilt International’s award-winning access control system that has a wealth of features and integrations. The addition of Dahua complements an already rich set of integrations and enables users to play live video or recorded video associated with a door through the Dahua solutions. Ross Wilks, Head of Marketing at Vanderbilt International expands on the value of this, stating “If an event happened last week where a door was forced open, the operator can right-click on the event in ACTpro software and simply replay the video recording from the Dahua system.” Dahua – Vanderbilt integration “This makes for a more precise examination of the video system concerning the access control event. It also removes the operator's need to visit the control room to retrieve the footage, as it can be viewed directly within ACTpro instead. This, of course, delivers an added layer of convenience to the system’s users,” Ross concludes.
Videx Security appoints James Rose, an experienced professional in the access control and door entry market, to National Projects Manager. In the newly created role, James is responsible for Videx’s large-scale access control and entry projects, predominately in the social and private residential sector. A key element of his role involves onsite leadership for the project team, taking ownership of the full project life cycle from initiation to completion. Developing strong relationships James is an integral part of the Videx team and has been working at the company for over 10 years. He has a strong technical and sales background with extensive knowledge and expertise of the Videx range of access control and entry systems. John Rickard, Managing Director of Videx, said: “James not only has an in-depth understanding of the business, our products, and the industry generally, but he also has developed strong relationships with key partners - installers, distributors and integrators - through his technical and sales roles at Videx over the years. Together with his passion for innovation, James will be able to create new business opportunities with large scale, expansive projects in his new role.” Prioritizing technology innovations Both James and James will work closely together in securing larger contracts for Videx “At Videx, we pride ourselves on providing a bespoke security solution and understanding a customer’s specific requirements which sets us apart from other entry manufacturers. Building on this USP, James will help us to secure more projects where the specification required is highly bespoke and tailored to specific customer needs.” The news follows the appointment of James Gray to National Sales Manager. Both James and James will work closely together in securing larger contracts for Videx, focusing on those sectors that provide the most growth potential to the business. Of particular focus this year are local authority and housing sectors as well as the healthcare industry which is calling for increased door entry and access control measures as they focus on bringing the current pandemic under control by reducing the spread of COVID-19. James added: “I am looking forward to taking on a challenging, but exciting, role as we push forward with our growth plans, prioritizing technology innovations and best-in-class customer service.”
Ping Identity, the Intelligent Identity solution for the enterprise, announced Project COVID Freedom which leverages its recent acquisition of ShoCard personal identity to allow healthcare providers, businesses, and individuals to easily share proof of COVID test results and vaccinations. Project COVID Freedom creates a secure and privacy enabled way for healthcare providers, businesses, and individuals to verify test and vaccination results, while keeping users up to date on vaccination status overtime via private encrypted messages. Receive digital proof Individuals instantly receive a digital proof of their vaccinations in their secure ShoCard mobile wallet from enrolled healthcare providers, then can securely share with participating employers, restaurants, entertainment arenas, friends, family, and more, using a QR code. Using Ping Identity’s solution, vaccine providers can send timely reminders directly to customers Unlike other vaccination passports, Ping Identity’s solution provides a secure way to continuously manage test results and vaccination status, speeding up the time it takes to demonstrate proof of vaccination, and providing a more versatile and trustworthy solution over paper certifications. Using Ping Identity’s solution, vaccine providers can send timely reminders directly to customers when they are due for a second dose. Users' digital identity Or, if a batch of vaccines is discovered to lack efficacy, providers can revoke the proof and instantly communicate corrective actions. “Achieving normalcy post-pandemic will demand a level of verifiable safety in the places where people come together most,” said Andre Durand, CEO and Founder of Ping Identity. “Using secure and private technology that’s easily accessible from a smartphone, Project COVID Freedom helps simplify the vaccination process so individuals, businesses and healthcare providers can increase in-person safety without compromising users' digital identity.” decentralized identity technology The complete end-to-end solution requires no integration or coding to begin issuing or verifying proof of vaccination “A return to normal requires secure and trusted ways to share and verify vaccination status,” said Gautam M Shah, Vice President of Platform and Marketplace at Change Healthcare. “Supporting Project COVID Freedom is a natural extension of Change Healthcare and Ping Identity’s common goal to use secure, highly accurate identity to enable trusted healthcare interactions for patients, healthcare providers, and payers alike.” Ping Identity’s COVID Passport uses decentralized identity technology based on the ShoCard platform to provide verifiable proof of test results and vaccinations, which may be securely shared when a user permits through facial or fingerprint biometrics. The complete end-to-end solution requires no integration or coding to begin issuing or verifying proof of vaccination. Individuals are only required to download an iPhone or Android app. Early access testing The service is early access testing being offered for free to all governments, businesses, healthcare providers, and individuals, and will become widely available after early access testing is complete. Additional and advanced use-cases will be available to Ping Identity customers already leveraging the Ping Identity platform for identity, but it is not required. Healthcare providers, Businesses, or individuals can sign up to receive early access at ShoCard’s official website. ShoCard is a trademark and service of Ping Identity.
OnSolve, a renowned critical event management provider for enterprises, small-to-medium sized organizations, and government entities, announced significant momentum with a brand relaunch and the roll out of a new platform integration engine, which adds more than 450 out-of-the-box integrations to customers’ existing physical security, business continuity, and IT management ecosystems. In 2020, the company added ~450 new enterprise and government customers, such as Cincinnati Bell and Penske, and grew bookings by 45 percent. With its AI-powered risk intelligence and platform innovation, OnSolve is empowering customers through speed, relevance, and usability to deliver true actionable intelligence during a crisis, ultimately keeping people safe and protecting their organizations. Social media platforms OnSolve’s new brand identity symbolizes its resolve to enable customers to meet current and future challenges with the expertise and mission-critical technology that saves lives and creates true organizational resiliency. This includes a new logo and visual identity that will be implemented across all OnSolve channels including its website, social media platforms, sales and marketing materials, and customer touchpoints. The need to better manage uncertainty is more critical than ever to saving lives and protecting organizations" “The need to better manage uncertainty is more critical than ever to saving lives and protecting organizations,” said Mark Herrington, CEO, OnSolve. “Our customers turn to OnSolve to help them navigate today’s uncertainty. Our AI-powered platform and relaunched brand underscore our relentless commitment to empowering organizations with technology that delivers insight, resilience and continuity during a crisis - keeping people safe, informed, assured and productive when it matters most.” Risk intelligence and platform innovation “Our partnership with OnSolve is essential to building a more resilient employee community at athenahealth,” said Bridger McGaw, Director, Global Security & Services, athenahealth. “When COVID-19 hit, we felt more prepared than other companies our size because we had a trusted, tested, easy-to-use, cloud-based critical event management platform in place to communicate with our employees ahead of an incident, as well as the ability to gauge the impact of localized COVID-19 outbreaks across our dispersed workforce.” The OnSolve Platform for Critical Event Management (CEM) offers a fully integrated suite of products: OnSolve Risk Intelligence, Critical Communications, and Incident Management. At the core of the platform is Risk Intelligence. Its powerful AI engine uses machine learning to ingest thousands of verified data sources, identify the most critical events facing an organization and deliver these alerts to the right people at the right time - far faster than human analysts. Critical communications innovation OnSolve’s next-generation risk intelligence capabilities, coupled with foundational critical communications innovation and incident management, enables organizations to: Bypass human analysis using an AI engine, so customers or in-house analysts can communicate faster and quickly activate crisis response plans Filter out irrelevant data, so staff can monitor only the critical events that matter most to their people, places, and property Target alerts to the right people immediately to enable informed, proactive decisions Identify active incidents at a glance, improving response times and enabling customers to activate their business continuity plans and virtually collaborate in real-time, from any location IT management ecosystems OnSolve experienced a banner year of momentum in 2020, with 45 percent growth in bookings The OnSolve Platform for CEM has also rolled out new integration capabilities through its OnSolve integration engine. The OnSolve integration engine paves the way for customers to seamlessly take advantage of more than 450 out-of-the-box integrations for their existing physical security, business continuity/business resiliency, and IT management ecosystems. Through the OnSolve integration engine, customers can instantly orchestrate tasks such as wellness checks and alerts to impacted areas; disable building access; and even trigger appropriate tests based on sensor data such as temperature drops, water levels, electrical current detection, or gunshot/monitor detection. OnSolve experienced a banner year of momentum in 2020, with 45 percent growth in bookings. Security audit compliance New customers, renowned recognition and accreditation, and strategic leadership changes underscore the company’s success in helping organizations better manage uncertainty and crises: OnSolve was recognized in Gartner’s 2020 Market Guide for Emergency/Mass Notification Services Solutions report; and for the third year in a row, the company was awarded two ASTOR awards: Best Mass Notification System and Best Risk and Crisis Management Product. As a testament to its excellence in risk and compliance for federal agencies and the public sector, OnSolve was listed on the FedRAMP marketplace and also achieved HIPAA security audit compliance, enabling the company to sign business associate agreements with healthcare institutions as needed. To support its growth and evolution, OnSolve created new leadership roles and departments in 2020. Ann Pickren assumed the role of Chief Customer Officer to oversee the critical adoption and implementation of the OnSolve Platform by the company’s existing customer base. The company created a new function focused on enhancing alliances, partnerships, and channel relationships, led by Vice President of Global Security Solutions Matt Bradley, a 14-year veteran of the Central Intelligence Agency. COVID-19 vaccine deployment Most important, however, is the life-saving role OnSolve solutions continue to play. Its critical communications technology sent billions of notifications, helped to find more than 3,500 missing persons, and supported nearly 30,000 customers via capabilities in over 190 countries worldwide. Nearly 200 communities are currently using OnSolve to manage information sharing related to COVID-19 vaccine deployment, with more than 640,000 messages sent to date and growing every day.


Expert commentary
The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave. In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software. The widespread adoption of IP cameras, cloud computing capacities, and smart sensors have paved the way for new AI products and solutions to function at scale. AI-powered video analytics One application of artificial intelligence for the video surveillance sector is the use of video analytic solutions to analyze video streams in order to extract pre-determined objects, behaviors, or situations. To give some examples, AI video analytics can be used to monitor perimeter crossing for border control, detect fevers or masks in airports or public spaces, arms detection in casinos, or be used to filter out alarms triggered by benign movements versus real intrusions. This application of artificial intelligence leans on its specific branch, machine learning, which uses a complex series of AI models to analyze the content of the video flow, autonomously identifying and classifying the videos according to predefined rules. Adopting technology AI video analytics yields promising benefits, a reduction in operational costs, and an increase in safety, and a decrease in risk When AI video analytics are used effectively, they yield very promising benefits. A jump in video flow analysis from an average of 10% by humans to 100%, a reduction in operational costs, and an increase in safety, and a decrease in risk. The use of AI video analytics for surveillance sounds simple enough, however, there are several perceived factors inhibiting security organizations from adopting the technology. Adopting AI into your video surveillance operation The security industry is capital intensive, complex in its IT structure, and diverse in situational business needs. Therefore, resulting in a perception of high effort, time, and costs required to successfully integrate AI into your video surveillance operation. However, these effort constraints can be debunked due to the flexibility of video analytic solutions. Three areas that deter security organizations from adopting AI Existing capital A surveillance operation contains a network of cameras that film with a range of video qualities. AI video analytics can analyze a range of videos from low to high resolution in thermal, infrared, and visible formats AI video analytics often operate on smart cameras that have the appropriate video image quality for the capacity of content analysis. The costs involved in overhauling legacy camera systems, converting videos into higher quality, or waiting until the current camera network is ready to be replaced in order to integrate AI is expensive, time-consuming, and often unfeasible. However, not all AI video analytic solutions need to be deployed on edge with smart cameras. Instead, video analytics can be deployed both directly on to the camera or have server-based integration maintaining and scaling to your existing camera network. AI video analytics can also analyze a range of videos from low to high resolution in a variety of formats: thermal, infrared, visible. Complex IT structure A single central command center or in-house security network operates in a multi-manufacturer environment. This means cameras, video management systems, and technology partners can be provided by several manufacturers therefore increasing the complexity of successful IT workflows and integrations. Theft or perimeter infringement can take place in a matter of minutes, therefore the transfer of information between solutions is required to function at top speed. To overcome this complexity, the successful integration of solutions in a multi-manufacturer environment is assured through industry enforced standards set by non-profit organizations. This allows for third-party solutions such as AI video analytics to be easily integrated into the bulk of software and hardware technologies. Diversity in security needs To obtain high performance in a diverse security setting is inherently built into AI video analytic machine The objective of a surveillance operation can vary greatly from one organization to another. Retailers prioritize theft detection, while city governments may be concerned about arms detection or people counting. The capacity for AI to function with high performance, meanwhile adapting to several organization’s security needs requires algorithms to be trained accordingly. To obtain high performance in a diverse security setting is inherently built into how AI video analytic machine learning model’s function. AI can be trained to adapt to different environments and uses progressive learning to increase performance overtime. A collaborative effort between security experts, data scientists, and business strategists will ensure high performance and an appropriate application of AI to fit each organization’s specific needs. Surveillance innovation moving forward While for some video surveillance organizations, the costs and time associated with successfully integrating AI into their network may seem daunting, there are ways to adapt new technology into an existing operation with minimal effort. The emerging presence of smart cameras and IoT products will only accelerate the adoption of AI moving forward. If your organization is looking to enhance its operation with emerging technologies, now can be the time.
A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those precious minutes before an ambulance arrives. There are currently over 10,000 in the UK, located in parks, offices, high streets and sporting venues, and they are especially popular in rural communities, where ambulance response times are longer. Every second counts Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or locked. Leaving them open could lead to theft, vandalism or misuse. Leaving them locked could mean that precious moments are lost waiting for a local guardian to arrive – and could even cost a life. To save as many lives as possible, it’s clear that PADs need to be available 24/7, fully operational and easily accessible to users and local guardians. But there is a solution that can meet all these conditions – a lock that can protect against vandalism while providing convenient instant access when required. Life-saving solutions Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or lockedDigital locks are ideal for securing PADs because they don’t require a key, and anyone can be given access over the phone. In the case of a cardiac arrest, the user calls 999 and the ambulance controller provides them with a simple, easy-to-remember code. The ambulance controller can then advise them, step by step, what to do. Local guardians, who have responsibility for the PAD, can be provided with an override key to enable them to monitor and maintain the defibrillator. The PAD cabinets built by Duchy Defibrillators show exactly how this works in practice. Based in rural Cornwall, Duchy Defibrillators manufactures, supplies and installs monitored PAD cabinets. To provide public access to the defibrillators, it needed a lock that could keep its cabinets secure, make them easily accessible and withstand the stormy Cornish weather. Codelocks recommended a digital electronic lock that could operate on a standalone battery, making it especially suitable for remote areas. As well as offering flexible access, digital locks come with a range of varying options and functions to suit different applications. As Duchy Defibrillator cabinets are installed in a wide variety of locations and sometimes need to withstand outdoor exposure, it opted for a robust electronic digital lock that is both affordable and easy to set up. A digital-access revolution Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end-users The example of Duchy Defibrillators shows how digital locks can be used to keep defibrillator cabinets secure while affording instant access to users when they are needed. But the flexibility of digital locks also makes them suitable for securing property and equipment in a wide variety of situations, especially for shared and public facilities. This is why you’ll increasingly see digital locks used to secure restricted areas in hospitals, schools and offices, as well as shared facilities like hotel and gym lockers, public restrooms and more. Digital locks are available for a number of specific applications, including doors, lockers and cabinets. They can range from simple mechanical locks through to more sophisticated electronic locks and state-of-the-art smart locks. Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end users – making them very popular for contactless entry and with facilities managers that need to manage access to buildings and campuses. One thing is certain – whatever your access control requirements are, there’s a keyless lock solution to suit. The digital access revolution is here.
Latest insights from the Economist Intelligence Unit’s Global Barometer show that 41% of execs think 5G is now less important than it was before the pandemic. There are numerous reasons why this could be the case, one being that 4G and home broadband has been proven to be up to the job of supporting home working. There’s also no escaping the headlines that surround 5G and political espionage. They read like a script from House of Cards. Presidents, prime ministers, heads of foreign intelligence services and global corporate leaders, providing the colorful characters that are essential in any good political drama. It could well have made some organizations rethink their plans for adopting 5G enabled technologies and wait until there can be more assurances on security. New technologies The latest edict by the UK government is a pretty clear statement. It has promoted many industry insiders to say that it will take years to exchange kit, possibly even a decade for some operators, as they take on the heavy lifting of removing core network components and finding alternative suppliers. The financial impact is huge: operators will have to find additional budget to purchase the kit, conduct validation and integration testing, overhaul their service wrap around offers and factor in the time and cost of retraining employees on new technology. Achieve new ambitions related to driverless cars Despite all this, many carriers have made very public statements that they will progress with 5G as planned, some are even accelerating plans. The insight available to them confirms that there is still a good proportion of businesses and pubic bodies that see its value. It’s a way to propel smart city development and connectivity, and to achieve new ambitions related to driverless cars, and highly automated manufacturing for example. 5G therefore remains a rolling stone and regardless of the core network kit, security needs to be designed in, not bolted on, at every step of network and application design and build. New rules for working The pandemic has shaken up how we live and work. It has brought home the necessity for ultra-fast, affordable and agile communications everywhere. It’s also proved a fertile hunting ground for scammers keen to exploit the public’s thirst for up to the minute news. Click bait has been rife and it still forms one of the most effective ways to distribute malware and ransomware. Unprotected VPNs have added to the risks, as companies scrambled to roll out remote access at mass scale. It overburdened their security infrastructure and created vulnerabilities all in the name of getting home working ramped up quickly. Some companies have learnt the hard way that maintaining patches on software and keeping on top of the security education their employees receive is vital to protect operations from attack. Rural vs urban working The move to home working has also brought to light discrepancies in speed and access to communications, reigniting the rural versus city investment debate. We’ve seen some companies say that employees can now work anywhere, and others downsize their office footprints. This is opening the door for people to swap city living and commutes for more rural locations. 5G roll out plans typically focus on large cities and towns, but is this still the right strategy? I’d suggest that operators need to step back and look at the larger global trends and update their plans. Connected cows and beyond For example, farming and the environment has to be a planning priority now. To meet the needs of a predicted 9 billion people in 2050, farming supply will need to increase by 50%. COVID-19 has brought into sharp focus how precarious the global food supply chain is. In addition, this increase needs to be met with technology to make agriculture more efficient in order to preserve the world’s natural resources while meeting these goals. COVID-19 has brought into sharp focus how precarious the global food supply chain is The vision of the ‘connected cows’ is mooted as a way to solve global food security. As such, farming and the environment are set to gain greatly from technologies and applications enabled by 5G Internet of Things (IoT). But the benefits will only be realised if the connectivity and security is in place. The vast network of IoT sensors that will be used to improve farming inefficiencies, increase welfare standards and reporting, as well as efficiently manage food manufacturing will generate an abundance of data. Highly sensitive data This data will range from highly sensitive sets related to pricing and employees, critical data related to yield management and compliance, to more transactional weather and water sensor data. Ensuring continuity will be essential to not just farming productivity and meeting standards, but also protecting IP or personal information throughout the supply chain and preventing a cyberwar intended to starve people. Corporate espionage is a very real threat to manufacturing at the moment, and as farming becomes more connected, it’s expected this threat will extend as far as the farmyard. Not only that, protests against government handling of policies related to food poverty or overproduction could be done using ‘hacktivism’. It’s easy to buy a hack these days and start an online attack to make your point. So, as farming adopts technology models we usually see in the corporate world of pharma and finance, it too may become a target. Healthcare goes truly national The much talked of vision for the virtual GP accelerated in the pandemic, helping people see a GP without leaving the house. Governments have had a very real glimpse into the importance of connected healthcare in terms of saving money and time. There is now a greater likelihood that nursing teams will be given mobile devices that can access and update patient records in real-time, GPs will scale down consultation space in favour of online appointments, and prescriptions will be automatically filled and delivered at the click of a button. Comprehensive 5G networks can help make more of this happen particularly in remote areas where health care is scarce, of that there is no doubt, and this is before we get into the exciting prospect of remote brain surgery that 5G can facilitate. The pandemic also exposed the precarious nature of online healthcare But the pandemic also exposed the precarious nature of online healthcare. Patient data remains a sitting duck, as illustrated perfectly by breaches we saw across the world both in public and private delivery. At its very worst, nation state attacks pose a significant threat to public health and it’s essential there is local and global collaboration to ensure data is protected. This threat won’t wane. In fact, it is increasing as we drive more innovation and connectivity. Security experts have their work cut out. But it’s not impossible to achieve secure networks and applications, so long as we don’t put profit before people.
Security beat
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry). The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market. The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg. Tesla amongst those impacted The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012. In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.” Hacking was possible due to built-in feature The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature. Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking." "Connected cameras are supposed to provide an additional layer of security to organizations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.” Super Admin account had access to all cameras Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.” Impact on broader video surveillance industry The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.” Widespread government and healthcare use The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organization to find relevant footage. The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Case studies
Essence SmartCare, part of global IoT solutions provider, Essence Group, has announced that ADT Security Australia, a globally renowned provider of security monitoring services, has selected its Care@Home Enhanced Telecare Services platform to expand ADT’s Health and Wellness services offering in Australia. Care@Home solution ADT Security Australia is part of Johnson Controls, the global company in smart, healthy and sustainable building solutions. This partnership was facilitated in conjunction with, HSC Technology Group. It will enable ADT to enhance its senior care offerings in Australia by providing a new range of assistive services through Essence’s Care@Home solution, under the banner of ADT Home Assure. The rollout of Essence’s technologies will allow ADT Security Australia to offer breakthrough telecare services to seniors using state-of-the-art technology and utilizing the LTE network. Enhancing senior care offerings This announcement comes as the senior population is set to grow rapidly in Australia, with the proportion of seniors who are over the age of 75 to grow from 33% to 55% in the next 30 years and annual revenue for home-based care and services of around $ 4.5 billion AUD (Australian Dollar). “We are honored to be joining forces with ADT Security Australia, one of the largest security and safety solutions providers, to enable them to provide the best care and protection to Australian seniors,” said Barak Katz, General Manager for Essence SmartCare. Unified telehealth and care platform Our unified telehealth and care platform enables monitoring at any level" Barak Katz adds, “Our unified telehealth and care platform enables monitoring at any level and through any type of caring device for a wide range of health conditions, both at home or on-the-go, all through one connected Care@Home smart platform.” Essence SmartCare’s award-winning Care@Home platform is an aging-in-place product suite, providing seamless health monitoring solutions that enable seniors to live independent lives, while also providing their families with peace of mind. Leveraging deep AI capabilities Leveraging a variety of advanced technologies, including deep AI capabilities, to ensure the safety of seniors, the platform comprises an integrated suite of services, including continuous monitoring of daily activities, advanced fall detection, and voice-activated alerts to facilitate real-time communication with caregivers and emergency services providers. “At ADT Asia Pacific, our mission is to protect the lives of our customers and their assets across the region by providing the highest quality solutions and services leveraging best-in-class partners,” said David Kirubi, Vice President of ADT Asia Pacific. David Kirubi adds, “Essence’s Care@Home solution presents a substantive and unique industry value proposition in enabling this mission, for the benefit of our customers, while ensuring peace of mind for their loved ones and caregivers.”
As the Jigme Dorji Wangchuck National Referral Hospital (JDWNRH) works round the clock, one of the major concerns was to manage complex shifts of employees. Elevator control, where only users with access rights can call the elevator, was another challenge the hospital wanted to meet. Furthermore, the customer also wanted a solution, with the help of which the admin could assign entry and exit points for patients, visitors and employees. Lastly, the management wanted to restrict visitor entry to a pre-defined time and rooms of the hospital for better visitor management. Access control solutions Matrix’s Access Control, Time-Attendance, and Visitor Management Solution along with the different variants of biometric devices fulfill every requirement of this renowned Hospital. Around 206 devices were installed in the hospital that is used in controlling access at rooms and elevators. Devices were installed at the main entrance, wardrooms, server rooms, outside elevators, and ramps on every floor to restrict access. So, there is no individual in the building who is not enrolled in the system. As the hospital works 24 hours, there are multiple shifts in which the employees work. Through this, the hospital could manage multiple shifts of employees. Approximately, 700 visitor profiles were created with constrained time to visit, limited rooms to enter, and a pre-defined route of access. Also, the crowd at the elevator was controlled by restricting the use to only users with elevator access rights. Results JDWNRH fulfilled its requirement with Matrix People Mobility Solution and achieved the following results: Improved security by restricting un-authorized entry using an access control solution Reduced complexity of shifts by time-attendance solution Crowd controlling through elevator access control Time-based and zone-based entry restrictions for visitors and patients
AZ Alma was a brand new hospital, created by merging two other hospitals. It needed an access control system that could cope with the demands of high levels of employees and visitors, varying access rights, and the flexibility to respond in emergencies. The new hospital also had a vision of being completely keyless. Opportunities offered by AEOS AZ Alma installed Nedap Security Management’s AEOS access control system and implemented several useful features. LEDs on readers, for example, instantly show nurses which rooms they can’t access. AZ Alma installed Nedap Security Management’s AEOS access control system By integrating Mace readers, AZ Alma can give patients a QR code that gives access to parking, doors, and elevators, so they can go straight to the right department. And, in line with its keyless vision, even the electrical cabinets have card readers. Key benefits High security & convenience Significant time and money saved by going keyless Option to trigger emergency settings that change access rights immediately Use of QR codes increases convenience for patients Easy to allocate and manage access rights, even for high volumes of people Freedom to integrate a specific choice of readers and other hardware Future-proofed access control that can be easily extended and adapted AEOS access control system AEOS access control system, developed by Nedap Security Management, is a software-based access control system, operated via a web-based dashboard, offering remote log-in from anywhere to control and monitor access. To add more functionality to the system, users can simply select extra options from their access control software. As AEOS is built on open standards, it integrates with a wide range of technologies, including video monitoring and biometric readers. And it has the flexibility to scale easily, so users can build and grow their access control system.
Since the beginning of the Corona pandemic, MOBOTIX thermal cameras have been increasingly used in the healthcare sector, as well as airports, train stations, public authorities, and companies, to detect temperature anomalies in people without contact and thus contain the spread of the virus. However, this aspect is only one area for which MOBOTIX technology is currently providing special services. The MOBOTIX 7 Platform, with its intelligent and cyber secure camera systems M73 and S74, predestined MOBOTIX video technology even before the pandemic to ensure comprehensive, digital support in healthcare clinics and the care of the elderly and disabled. The reliable, high-quality video systems made in Germany reduce hospital and nursing staff's workload, provide digital care for patients and residents, and optimize care and workflow processes. Parking lot management Basic safety and pandemic protection in healthcare Also, during the pandemic, a special duty of care applies to employees, patients, and residents as a risk or high-risk group. MOBOTIX video technology is used in numerous clinics, retirement, and care facilities worldwide to ensure that patients, residents, and employees have a carefree stay and can work safely. Dangers and sources of risk are detected, and the intelligent systems warn, report, or directly initiate assistance and rescue measures. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities This allows staff to concentrate on their work, while hospital patients and nursing home residents can recover more quickly and get the rest they need. MOBOTIX video technology is also used for early fire detection and access control, mainly to protect sensitive areas such as sterile rooms, operating theaters, or medication depots. MOBOTIX also offers the right solutions for intrusion and theft protection, securing outdoor spaces, or access monitoring and parking lot management. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities: Temperature-sensitive people are detected as soon as they enter the facility and can be immediately sent for further examination. Crowding is avoided, and social distancing can be supported. MOBOTIX video systems detect when no mask is being worn and trigger an alarm or an information announcement. Cybersecurity and data protection Cybersecurity and data protection "Made in Germany” Particularly in the healthcare sector, cybersecurity and data protection must be given the highest priority. After all, it is a matter of protecting lives. But it is also about sensitive, personal data that must not fall into the wrong hands under any circumstances. MOBOTIX video systems consist of high-quality components. Developed, produced, and comprehensively tested at the company's German headquarters in Langmeil/Rhineland-Palatinate, the company creates products and solutions that are impressive not only because of their outstanding image quality - even in the most challenging lighting conditions. One hundred percent DSGV-compliant, the decentralized MOBOTIX systems stand for the highest possible cybersecurity and comprehensive data protection. Unauthorized persons cannot read the stored data. Intelligent video technology Relieving the workload of hospital and nursing staff with "digital care” Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload Hospital and nursing staff often work at the breaking point. Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload. For example, adequate video support can be used to carry out control rounds digitally. On the one hand, this creates free space that can be used for personal care and nursing, while on the other hand, emergencies are reported directly at the time they occur - and thus, the staff does not lose critical time. Effective signaling and calling systems targeted alarm differentiation, and the avoidance of false alarms keep staff motivation high and reduce alarm fatigue. Incorporating audio systems Digital and discreet care for patients and those in need of care MOBOTIX provides discreet video support for round-the-clock security without anyone feeling they are being watched. The video surveillance systems in healthcare facilities are discreetly and unobtrusively installed; they also detect and alert only when defined events occur to keep recordings to a minimum. At the same time, patients and residents can be sure that help will arrive quickly in an emergency. Even at night, helpless individuals are detected immediately, ensuring their safety and preserving their independence. By incorporating audio systems, MOBOTIX video solutions for healthcare also enable patients to be addressed and communicated directly with. license plate recognition Optimize hospital and care processes Smooth organization of routines helps hospitals and retirement and care facilities be efficient and profitable Smooth organization of important routines helps hospitals and retirement and care facilities be efficient and profitable. Numerous processes can be automated and optimized with MOBOTIX video technology, from the facility's journey to check-out. For example, professional parking management with license plate recognition can ensure that only authorized vehicles can access specified areas. In this way, ambulance access routes can be kept free, or parking fees can be billed in a straightforward, fast, and accurate manner. Queues in registration or examination areas can be avoided, and smooth administration and medical and care areas can be enabled. University hospitals or teaching institutions can use high-resolution camera systems, e.g., in operating theaters, to fulfill their teaching and training mission without disruptions. Customers can develop further apps that enable completely individual solutions themselves or have them created by MOBOTIX and its technology partners and certified concerning cybersecurity. Advanced video technology Comprehensive solutions with the best return on investment Healthcare is a market that is extremely important to MOBOTIX. The high level of solution expertise digitizes processes and work steps in everyday hospital and home life, using intelligent and future-proof video technology. Thus, simplifying work and making it safer also relieves the healthcare budgets' pressure and increases profitability (ROI).
Milton Keynes University Hospital has installed a Videx VX2200 system, one of the UK’s renowned access control manufacturer’s flagship door entry systems with 5178 hands free audio units and touch free entry points. Through opting for a touch free entry solution, the hospital has been able to reduce physical contact between people to help stop the spread of COVID-19. Four independent units were installed by ST Fire and Security in different buildings of the hospital. One was installed at The Campbell Center, a 38-bed acute inpatient mental health unit, another system fitted at the hospital’s dental surgery, a system fitted at the entrance of urgent care and a final one at Eaglestone Health Center which is a specialist Child and Adolescent Mental Health Service (CAMHS) facility. Audio apartment station Simon Turpin, Owner of ST Fire and Security, said: “The Videx VX2200 system with hands free audio apartment station and touch free entry points delivers huge benefits to the hospital by safeguarding patient, visitor and NHS staff safety as well providing easy and convenient access. The new system reduces waiting times as when a visitor uses it, someone in the building is immediately notified and will come to see them to complete entry.” “The Videx kit is the only one on the market currently that can offer convenient access in a touch-free way - they’re highly useful in helping the hospital ensure people stick to the designated one way system in place.” Touch free access Proximity access control can be added allowing authorized personnel to enter buildings touch free" As well as providing touch free access, the Videx system has replaced an existing system that had failed, affecting secure and convenient access to and from The Campbell Center. The Videx solution means no patient or member of staff is waiting for access into the secure mental health unit, safeguarding patients and employees. Ben Davies, South East Sales Manager, Videx UK, said: “Our touch free access control range has proved hugely popular in recent months as minimal contact remains key to reducing the spread of the coronavirus. The range offers both exit buttons and entrance panels in a touch free format using infrared sensor technology, providing a no touch solution for businesses as they focus on creating a COVID secure environment for their employees, partners and customers.” Bespoke entry panels “Proximity access control can be added allowing authorized personnel to enter buildings touch free, which is particularly useful for hospitals and other NHS buildings such as GP surgeries and urgent care facilities. We can also provide fully customized options, offering bespoke entry panels and exit buttons that are in keeping with the surroundings of the building whether that’s a specific hospital ward, GP surgeries, or dentist practices.”
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nashik, Haridwar, Ujjain, and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms, and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)


Round table discussion
Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Products


White papers

Solve Access Control Challenges in the Healthcare Sector
Download
Using Smart Video Analytics to Improve Operations in Healthcare Facilities
Download
How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing
Download
Thermal Cameras: Can They Accurately Detect Body Temperatures?
Download
The Healthy Market For Video Surveillance At Medical Facilities
Download
