Actuate, the globally renowned provider of automation and intelligence software for smart security camera systems, has announced that it has closed its Series A financing of US$ 8 million to expand the capabilities of its computer vision technology and build on the company’s growing portfolio of customers. The funding round was led by Tribeca Venture Partners and joined by Scribble Ventures, OCA Ventures, and Context Ventures, with additional support from existing investors, including Bli...
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies a...
ADT, the trusted brand in smart home and business security, brought an action for willful trademark infringement, unfair competition, and related violations against Ring LLC (Ring), an Amazon company and provider of smart home security devices. In March 2021, the complaint asserts, Ring adopted a blue octagon mark that is virtually indistinguishable from ADT’s iconic blue octagon mark, which is protected under numerous federal trademark registrations. ADT’s blue octagon is iconic in...
Paxton’s combined video management and access control platform, Paxton10, now allows administrators to manage multiple sites, spanning cities, countries, and even continents. Paxton10 Paxton10 is the newest and most powerful system, developed by the international security manufacturer, Paxton Access Limited (Paxton). The new system is critically acclaimed among industry experts, as well as a favorite for Paxton installers. One Paxton installer and the Managing Director of Seen Se...
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announces that it has been awarded a $91 million project with the U.S. General Services Administration (GSA) to improve facilities and energy efficiencies of landmark buildings. As part of the National Deep Energy Retrofit (NDER) program, the GSA is upgrading building technologies in the pursuit of net zero energy consumption while achieving energy goals prescribed in various federal Energy Acts. Support systemic manag...
DoorBird IP video door stations can now fully integrate with Yale and August smart locks. Home owners can connect their smart lock to the smart door station for a seamless ‘approach to entry’ experience. IP video door stations integration The new integration works with the August Wi-Fi Smart Lock, any August Smart Lock with a Wi-Fi Connect, and the Yale Assure Locks and Levers with Wi-Fi. Through the DoorBird app, residents will have access to the following features: Know who st...
Revolutionizing the pro-install security market, Nortek Control launches the 2GIG® EDGE™ security and automation panel. Packed with state-of-the-art Artificial Intelligence (AI) and edge analytics, the new 2GIG EDGE panel delivers the industry's first secure face recognition touchless disarm. Engineered using edge analytics and with technology built right into the panel ensures the homeowner's biometric data stays secure by saving it only on the panel. Once homeowner data is deleted, it is deleted forever. Another industry first includes 100 percent compatibility with the live feed of ONVIF cameras to the 2GIG EDGE panel. This allows homeowners to use existing ONVIF devices for their surveillance needs; all built on a foundation of security and data privacy. Intuitive user interface Upgraded with a new intuitive user interface in an exceptionally powerful and secure platform, the 2GIG EDGE panel not only supports encrypted sensors and devices but now provides the most secure way to disarm a system with hands-free convenience - no phones to carry or codes to remember. Additional features include a built-in radio and Wi-Fi communications, camera, and glass break sensor The 2GIG EDGE security and automation panel is housed in a modern, sleek design that is 50 percent thinner and offers a higher resolution edge-to-edge glass screen that eliminates plastic bezels, is five times brighter, and twice as large. Other upgrades include dual microphones with noise and echo cancellation and front-firing speakers that enable two-way voice communication for best-in-class audio quality. Additional features include a built-in radio and Wi-Fi communications, camera, and glass break sensor. Smart home security And, its 1.6 Gigahertz (GHz) quad-core processor combined with its built-in edge analytics make it one of the fastest panels on the market and four times faster and more powerful than the previous generation 2GIG panels. "Our 2GIG EDGE panel is born from security and not built from a tablet design. It provides the elevated capabilities consumers expect while delivering the most secure experience consumers have been wanting. Engineered with advanced edge analytics and face recognition touchless disarm, a first in the industry, our panel surpasses the IQ of any other smart home security panel on the market today. We know this is a game-changer positioned to take considerable market share evidenced by the enormous distributor and dealer demand from our pre-launch programs, of which over seventy percent of dealers are new-to-brand," said Bruce Mungiguerra, Senior Vice President of Global Sales and Marketing at Nortek Control. Professionally-Installed system Nortek Control developed the 2GIG EDGE security and automation panel to be the center of smart home "As the most reliable and most secure panel on the market, the 2GIG EDGE panel is destined as the industry’s go-to install enabling dealers and integrators to showcase the added value of what a professionally-installed system can offer." Nortek Control developed the 2GIG EDGE security and automation panel to be the center of smart home making it compatible with a broad array of home technologies and products. The panel allows users to seamlessly connect to cameras, doorbell cameras and directly view the video in real-time from up to eight different camera feeds. Further increasing security and data privacy, encrypted sensors and devices help eliminate system hacks and prevent account take-overs. Plus, integrators are able to customize the panel to a homeowner's personal needs with controls, rules, scenes, notifications, and Smart Areas™ zone partitioning. Smart home automation All this, plus the simple set-up and the rock-solid reliability that the 2GIG brand is known for, enables dealers to maximize productivity and sell a more compelling, complete solution that also opens the door for future smart home automation up-sell opportunities. "The design of the 2GIG EDGE security and automation panel brings together the best of Nortek Control intelligent AI, advanced home automation, audio, wireless and security technologies. The features these technologies enable culminate in layers and layers of value to homeowners while giving dealers and integrators a competitive advantage in selling the evolution of home automation and security. It is truly a next-generation platform that can scale and expand to meet future needs," said Quinto Petrucci, Vice President of Product Management for the Nortek Control 2GIG brand. Sensitive biometric data The integration of anti-spoofing technology ensures only the real live person can disarm the system" "We know that face recognition is a convenient plus, and to ensure consumers are extremely confident with this feature, the design of the 2GIG EDGE panel takes privacy protection to the next level. By processing analytics on the edge, sensitive biometric data is never sent over the internet. And, the integration of anti-spoofing technology ensures only the real live person can disarm the system." These advanced technologies and features earned the 2GIG EDGE Security Panel the coveted CTA 2021 Security and Surveillance Product of the Year Mark of Excellence Award. The panel has also gone through rigorous beta testing with integrators and users, the largest beta program ever undertaken at Nortek Control, who had the following review comments: "I can’t believe how fast this thing is. It’s the fastest communicator we have ever seen." "Video on panel is my favorite feature --seeing all the cameras on the keypad is great." "The responsiveness and small size of the panel are my favorite features." "Face recognition, it has the cool factor and is fast to respond." Technical training and sales training are being offered daily. Contact the Regional Sales Manager for more information about how to order.
Alarm.com is connecting your car and home through its integrated security platform to help people stay informed about their vehicle’s status and unlock more home automation capabilities. Alarm.com Connected Car, developed in collaboration with vehicle telematics solutions pioneer CalAmp, offers all the benefits of a vehicle monitoring solution plus the unique benefit of deep integration with the Alarm.com smart home security system. Vehicle insights, notifications, and home automation features are all accessible through one interface – the Alarm.com mobile app. “We’re excited to extend the technology and benefits of Alarm.com to include cars,” said Alarm.com Chief Product Officer Dan Kerzner. “Connected Car, like the rest of our offering, helps people monitor and manage the things they care about most on a unified platform with a seamless user experience. Adding cars is another step forward in our ongoing commitment to helping our partners improve the lives and safety of their customers.” About Connected Car Compatible with most cars manufactured since 1996, the Connected Car device plugs into a vehicle’s OBD-II port for easy self-installation, reducing the need for costly truck rolls to add the device. Connected Car uses a dedicated cellular connection and has a battery backup, so it communicates with the home system and end-user, even when the vehicle’s engine is off. With CalAmp’s telematics technology integrated with the solution, users can create rules so they receive Alarm.com notifications about specific vehicle details or activity, such as: Diagnostics and potential repairs (check engine light on, low battery, or low fuel) Driving Behavior (sudden acceleration, hard braking, excessive speeding) Unexpected Movement (vehicle moves while the engine is off, indicating it may have been towed, crashed into, or stolen) Automated rules and reminders Connected Car trigger automation rules and reminders via user’s existing Alarm.com-powered smart home security system Vehicles with Connected Car installed can be added to a user’s existing Alarm.com-powered smart home security system to trigger automation rules and reminders using the vehicle’s location. For example, lights turn on and the temperature adjusts as a driver arrives home. Or, alerts are sent to a driver’s mobile device if they leave without closing the garage door or locking the front door of their home. Authority Statements “I love having my home and car connected through one system and the consistency of Connected Car,” said Taylor Proudfit, COO at Titan Alarm in Phoenix, Ariz. “It's always on and works really well with the Z-Wave rules that I created to turn on the lights when my car pulls into the driveway. This takes security technology to a whole different level.” “We are very excited to be partnering with Alarm.com,” said Jeff Gardner, President and CEO of CalAmp. “By integrating CalAmp’s innovative telematics technology, Alarm.com customers now have seamless access to real-time information that will improve driver safety, enhance vehicle security and allow customers to stay on top of vehicle maintenance needs.” Connected Car is available through authorized Alarm.com service providers in the U.S. and Canada as a standalone solution or add-on to an existing Alarm.com-powered system.
The DIY system, launched by Edinburgh-based Boundary (Boundary Technologies), was designed and created by a team of experts, brought together by Boundary, to solve the problems associated with traditional alarm systems and using cutting-edge technology thinking. Grade 2 UK certification Having passed a program of rigorous pre-compliance testing, Boundary is currently pending certification (expected to be signed off end Q1) to Grade 2 UK & European alarm testing standards, which not only means that the alarm is robust and performs reliably, but that it is also tamper-proof to would-be burglars. Grade 2 UK & European alarm testing standard certification is also one of the requirements of insurers, as well as the police for an automatic level 1 priority response. Boundary, the DIY system The DIY version (no police, self-monitored) of the alarm system, Boundary Technologies is simple to install The DIY version (no police, self-monitored) of the alarm system, Boundary Technologies is simple to install and can be easily controlled from a smartphone, meaning that the owner has full control over their siren no matter where they are. It can be integrated with existing smart home systems, including Alexa and Google Home. In addition to being fully controllable from a smartphone, the Boundary smart home security system gives protection against all known threats, with intelligent sensors designed to minimize false alarms (including those caused by pets). End-to-end data encryption Users are given a choice of protection levels, in order to give them control, including a key-holder option. Boundary systems use the same end-to-end encryption of data as internet banking applications, with over-the-air security updates ensuring maximum protection. Unlike similar products of its kind in the market, Boundary is built to last, with a lifespan of seven years. What’s more, the system uses advanced algorithms and technology to check the system remotely, including battery life which, in the sensors, should last over a year. Flexibility and connectivity in security alarm systems Boundary is spearheaded by the duo that disrupted the payments markets with successful FinTech business, IPOS. IPOS was sold to iZettle, later acquired by Paypal. After identifying a gap in the market for a smart home security system that offers flexibility and connectivity at a reasonable price, Robin Knox and Paul Walton started to explore how technology could be used to disrupt the market for traditional hard-wired burglar alarms. Boundary smart home security systems Boundary home security systems will become the only truly ‘smart’ alarm system to meet the UK and European alarm standards Boundary home security systems will become the only smart alarm in the United Kingdom that are accurate enough to provide an automatic police response and the only truly ‘smart’ alarm system to meet the UK and European alarm standards. Despite suffering setbacks as a result of the COVID-19 pandemic, the team at Boundary managed to pull a funding round of £ 1.7 million in 2020 and is launching their product in the market against the odds in 2021. Leveraging AI to protect homes Commenting on the launch, Robin Knox, the Chief Executive Officer (CEO) and Founder of Boundary Technologies (Boundary) said, “2020 has been a year full of challenges, not least launching a highly regulated consumer hardware product in the middle of pandemic induced supply chain challenges. I’m thankful to our customers, team, investors and suppliers for their hard work and support to Boundary.” Robin Knox adds, “With home improvement still at the top of many people’s priorities, we’re optimistic for 2021 and are already looking forward to the launch of our second product, which will leverage AI (Artificial Intelligence) to proactively protect homes.”
Control4, a globally renowned provider of customized automation and control solutions, has officially certified the DoorBird driver. DoorBird IP door stations can now be integrated directly into Control4 systems. The smart video intercoms are developed and produced by Bird Home Automation Group in Berlin, Germany. integration with Control4 interface Customers can now access their IP intercom directly from Control4 interfaces, without the additional cost of a third-party driver. The new certified driver recognizes the doorbell, video camera, and motion sensor of the DoorBird door station, immediately after installation. The devices communicate over a shared-network via hardwired PoE (Power over Ethernet) or Wi-Fi. This integration features audio and video calls from the door station to touch panels or the Control4 OS 3 app, as well as a live view of the entrance area via the DoorBird camera. When a visitor rings the call button, a ringtone can play through the home’s audio system. The resident can then open their electronic door lock or garage door via the DoorBird icon, or anytime from the DoorBird app. Cinegration’s third-party driver functional This driver is free-of-charge and available in the Control4 Composer online database. The third-party driver from Cinegration, which had previously enabled the integration of DoorBird into Control4, continues to function.
Johnson Controls, a global provider of smart, healthy and sustainable buildings, announced it has joined The Climate Pledge, a commitment co-founded by Amazon and Global Optimism. Signatories of the Pledge commit to reaching net-zero carbon emissions by 2040, ten years ahead of the goal set out in the United Nations’ Paris Climate Agreement. Johnson Controls is one of 53 organizations that have now signed the Pledge, and the move comes hot on the heels of the company’s announcement of new environmental, social and governance (ESG) commitments, science-based targets, and its own net-zero carbon pledge. The pact will see Johnson Controls partner with other industry leaders to uncover new pathways to meet common environmental and sustainability goals. Paris Agreement’s goal Sustainability is at the heart of our business and fundamental to everything we do as a company" “Sustainability is at the heart of our business and fundamental to everything we do as a company,” said George Oliver, Johnson Controls chairman and CEO. “Climate change is one of the greatest challenges facing the planet today. Our recent announcement to achieve net-zero carbon emissions by 2040 through innovations and technologies such as our OpenBlue platform, further demonstrates our commitment to protect and preserve the environment." "We are looking forward to further enhancing the role we can play by working with Amazon, Global Optimism, and other signatories to reach net-zero carbon a decade before the important Paris Agreement’s goal.” Critical climate challenges The Climate Pledge allows signatories to share access to technologies, best practices, and innovations in supply chain enhancements, and create joint action to address the most critical climate challenges. Specifically, signatories pledge to accelerate the path to net zero by agreeing to regular reporting on greenhouse gas emissions, carbon elimination, and credible offsets. Johnson Controls has a long-standing business relationship with Amazon and has been working with the company since 2008. “As the U.S. takes an important step forward in the fight against climate change by officially rejoining the Paris Agreement this week, I am excited to welcome 20 new companies to The Climate Pledge who want to go even faster,” said Jeff Bezos, Amazon Founder and CEO. Streamline building operations The company is focused on empowering customers streamline building operations “Amazon co-founded The Climate Pledge in 2019 to encourage companies to reach the goals of the Paris Agreement 10 years early, and we’re seeing incredible momentum behind the pledge with 53 companies from 18 industries across 12 countries already joining. Together, we can use our collective scale to help decarbonize the economy and preserve Earth for future generations.” Johnson Controls’ participation in Th e Climate Pledge reinforces its mission to reimagine the performance of buildings to serve people, places, and the planet. As a leader in the buildings space for 135 years, and a pioneer in sustainability, the company is focused on empowering customers and communities to streamline building operations and deliver energy efficiencies that will help them meet their environmental goals. Clean energy solutions Johnson Controls is driving sustainability across its entire value chain by focusing on clean energy solutions, people, partnerships, performance, and governance. It is ranked in the top 12 percent of climate leadership companies globally by CDP and was named one of Corporate Knights’ Global 100 Most Sustainable Companies.
Openpath, a provider of renowned touchless access control and security automation for the built environment, has reimagined the ideal digital badge for today’s modern workforce and workplace. As an industry disruptor, Openpath first revolutionized mobile access control by studying user behavior to add obvious, simple, yet powerful tools that ensure a frictionless user experience while making organizations more secure. Now, Openpath’s new reimagined digital badge gives system administrators new ways to address their company’s security policies and procedures with greater focus, flexibility, and features such as: Customized digital badge design tool so the user’s physical ID badge and picture now match their Digital Credential Call or email for help feature to eliminate lock outs “at the door” Single Sign-On App authentication through Okta to ensure security compliance Door auto-detect technology recognizes the closest door on home screen Dynamic Status tags can change the user’s work group or vaccination status in real-time Streamlined support options to determine where and how employee questions are answered, either via Openpath or directly to their company’s security operations center (SOC). Touchless access control They are transforming traditional access control into an experience that is modern and seamless "As an enterprise customer of Openpath, we’ve been impressed with their ability to innovate and deliver a product that is both highly secure and that elevates the employee experience. They are transforming traditional access control into an experience that is modern, seamless, and meets the need of the new workplace," said Brooke Lierman, Senior Director of Workplace Technologies at Okta. At LabFellows, which offers remote lab spaces and cloud-based software automation for companies working on vaccine research for COVID-19, Openpath’s remote management, touchless access, and mobile credentials have heightened the security, reduced administrative burdens, and improved the overall experience of their smartlab workspaces. Physical keycard “We have so much intellectual property housed inside our laboratories, and a constantly rotating roster of customer tenants. Adding to that are reduced occupancy guidelines and heightened safety concerns due to COVID-19. With all of these challenges, Openpath has been key to the operational success, safety and security of both LabFellows and our HomeLab members,” said Julio de Unamuno IV, LabFellows Founder & CEO. The long-standing legacy of a physical keycard for identification being more secure than a digital keycard is no longer true. Mobile security has advanced, and the security vulnerabilities of a physical keycard, which are easily lost or cloned, still remain. Physical ID badge Furthermore, mobile badging ensures a pervasive, unified safety and security experience across all of an organization’s company apps, whether on browser or cellphone, and for the first time, notifies companies right at the door if there is a cybersecurity issue, and gives them the appropriate steps to resolve it easily, quickly and efficiently. Many enterprise companies require staff to wear a physical credential for compliance purposes While there will always be a role for the physical ID badge, Openpath has chosen to improve upon it by giving it a digital twin with features that other mobile solutions simply don’t offer, and customized solutions tailored to accommodate a company’s size, scale, and specific security needs. For example, many enterprise companies require staff to wear a physical credential for compliance purposes. Access control system Supplementing that with a digital credential offers a fail-safe in the event the physical badge is damaged or a second form of ID is needed to show an updated photo or other pertinent information, such as vaccination status. “The beauty of the Openpath’s open architecture system is that it allows us to continuously innovate and create new options for companies that weren’t thought to be possible with older technologies,” said Alex Kazerani, CEO and Co-Founder of Openpath. “We have been breaking barriers to mobile access control since day one and today we are so excited to deliver a new digital badge that surpasses the security of a physical badge, plus offers custom features and extensive functionality for system administrators of all types of companies and sizes.”
We still have some way to go before we see 5G service rolled out as a UK-wide service, but we can discuss future implications of 5G, and how it can improve device capabilities once its widely accessible. The impact of 5G lies within the increase in the amount of data that can be transferred between smart home devices through a cloud-based system. By utilising the cloud’s mass computing power and its ability to process data in larger capacities, we are able to receive more in-depth analytics that can help improve smart home devices by making them faster, more informed and intelligent. Will 5G boost innovation in the smart home market, if so, how? Innovation using 5G can be shown with current smart home CCTV systemsAn example of innovation using 5G can be shown with current smart home CCTV systems. Products at present allow you to use functionalities such as motion detection. As it stands, this is a basic form of monitoring that monitors changes in picture and notifies the owner when something unusual has happened. Once 5G comes into play, the video data captured can be sent off to the cloud, interpreted in more detail, and can allow the system to conclude whether the movement is from a human, object or animal. Facial recognition could also come into play here, providing a more seamless service when reporting incidents to the police. Similarly, you can use data from various different devices within your home to toughen security measures. A video camera used in conjunction with a presence or heat detector can eliminate small errors by providing the ‘bigger picture’ with more data points to work with - an amalgamation of all smart devices used in tandem. We can’t solely rely on smart devices to make decisions for us, but what we can do is improve device processing so that by the time we step in, we already have all the necessary information to assess the appropriate call to action. What will 5G enable homeowners to do within their homes? Smart homes using 4G currently operate in a fragmented fashion, incorporating Wi-Fi, Bluetooth, and other network protocols. Unlike 4G, 5G will work with low-power devices, making it useful for a broader array of connected products. This means that all devices we will be able to connect any internet connected product in order to allow integrated communication between all devices. Can be connected to work together in conjunction with your home system Your fridge and other kitchen appliances, for example, can be connected to work together in conjunction with your home system to create an entirely automated home. If your freezer is internet connected, you may get a notification if it loses power, but as everything else is also connected within your home, you will be able to determine whether it is a power fault or product fault straight away. Faster connectivity means that users can quickly take advantage of the data their smart devices provide, such as water use sensors which can monitor levels and allow for behavior changes to curb water usage The same can be applied with vehicles. Cars in future will be autonomous and include an integrated dashcam which can then be connected to your security system to provide added security on-site in the peripheral of your home, alerting you to potential intruders before they reach your front door.
The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the Smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer program Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer program, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardizing the behavior and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power. Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centers are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”
AMAG Technology, a world pioneer in unified security solutions that help organizations mitigate risk, announces that State Center Community College District (SCCCD) has selected its Symmetry Security Management System to install throughout all campuses. SCCCD will install AMAG’s Symmetry Access Control, Symmetry Intrusion, and Symmetry Blue Bluetooth readers. SCCCD chose DCL Technology as its integrator to deploy the system. Built-in intrusion system SCCCD encompasses four community colleges and two educational centers: Fresno City College, Reedley College, Clovis Community College, Madera Community College, Madera Community College at Oakhurst, and the Career and Technology Center. The project will begin with installing Symmetry in buildings on two campuses, with the intent to deploy Symmetry throughout all SCCCD campuses. AMAG’s Symmetry Blue readers will help SCCCD to transition to smart cards while still allowing to use of current access cards “We chose the Symmetry platform because of its dynamic ability to meet our growing needs. Symmetry’s built-in intrusion system provided an added convenience for us as we did not have to look for a third-party intrusion system,” said SCCCD, Security System Specialist, Vincent Fries. “AMAG’s Symmetry Blue readers will also help SCCCD to transition to smart cards while allowing us to still use our current access cards.” Partnership with SSSCD and AMAG “We are thrilled to be working with SCCCD and AMAG Technology and look forward to a long partnership as SCCCD expands and upgrades to an enterprise-level system over the next several years,” said DCL Technology President, Keven Smith. The expected completion time for the upgrade is three years. DCL Technology is a low voltage systems integrator servicing the Fresno/Madera and surrounding areas whose services include CCTV systems, alarm and fire systems, network cabling and fiber optics, and home automation systems.
GX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-DT35B can be compatible with Bluetooth medical devices, like blood glucose/blood pressure monitors, pulse oximeters, etc., to track medical data and remote monitoring directly from caregivers/physicians; and also has telecare alarm features, including emergency monitoring, inactivity monitoring, voice control, and home automation capabilities to assist seniors to have a more secure, healthy living. GX-DT35B Smart Care Medical Alarm is all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarm to keep seniors safe in their own homes. Bluetooth Medical Device Pairing GX-DT35B is compatible with Bluetooth Medical devices, like blood pressure/blood glucose monitors, pulse oximeters, thermometers, etc., to track health and medical data and allow caregiver/physicians to remote monitor and provide treatment as needed. Smart Home Automation ZigBee, Z-Wave, or Bluetooth automation devices incorporated into GX-DT35B creates a smarter and safer home, by auto turning on hallway lights at night to decrease the chance of a fall; or auto turn on the heater if there’s a sudden temperature drop. Wi-Fi Hotspot GX-DT35B can serve as a Wi-Fi hotspot, allowing users’ computers, smartphones, or other devices to connect and access the Wi-Fi network. Location Tracking GX-DT35B can be paired with BRPD-1 Bluetooth pendant, a small wearable panic button that partners with a smartphone application for GPS location reporting and trigger help alarm with one button press, whether the user is at home or out for a walk. Voice Control GX-DT35B is compatible with Google Home and Amazon Alexa voice control to control home electronic devices, allowing seniors to use their voice to make their environment more suitable without lifting a finger. Pivotell® Advance Automatic Pill Dispenser GX-DT35B is compatible with Pivotell® Advance Automatic Pill Dispenser, keeping secure of all pills, remind users to take their medication, keep track of their medicine intake, and allow caregiver/physician to monitor pill taking results/record and keep an eye on user’s needs. Voice over Internet Protocol (VoIP) & DECT GX-DT35B’s built-in VOIP function allows users to initiate two-way voice calls to contact CMS and family members during alarms and emergency. With the optional add-on of DECT, GX-DT35B can pair with voice extenders, talking pendants, call points…etc placed around the home to create a safety net and peace of mind. Visual Monitoring and Verification GX-DT35B can integrate Camera PIR Motion Sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Safety & Inactivity Monitoring GX-DT35B can support wireless sensor devices, allowing users to add smoke detectors, water leakage sensors, and gas sensors to monitor emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build healthier, safer independent living.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced how commercial real estate provider, Westminster Property Ventures has made innovative use of a range of Genetec solutions to make each of its premises safe from COVID-19 virus spread for staff, tenants and visitors. Westminster Property Ventures’ buildings house critical businesses, such as international banks, law firms, and consultancies who can be assured that amidst a global pandemic their offices remain highly secure and equipped for their return. Genetec Mission Control The newly introduced processes and technologies make smart use of Westminster Property Ventures’ existing video and access control infrastructure. For example, using the Genetec Mission Control collaborative decision management system, Westminster Property Ventures is collecting and qualifying data from thousands of sensors and security devices, before guiding security operators in their response to routine and unanticipated situations. Among other current and critical capabilities, this helps ensure the seamless transition of out-of-hours monitoring between Westminster PV’s in-house security team and security provider, Wilson James’ monitoring center, ensuring comprehensive levels of security at all times. “Our clientele continue to expect the highest level of security and service from us whether or not they are currently choosing to work inside our buildings,” said Andrew Forbes-Jones, Facilities Manager, Westminster Property Ventures, adding “We’re grateful to Genetec and Wilson James for keeping us at the forefront of innovation and compliance in all aspects of our security and operations.” Security Center Synergis access control system COVID-19 has created new challenges for Westminster Property Ventures’ security and operations teams in maintaining a secure and safe environment for both home and remote workers, as well as those still working inside the facilities. Using the Genetec Security Center Synergis access control system, Westminster Property Ventures is taking advantage of many COVID-19 specific features, developed over the last year, to help them directly address the challenges of the global pandemic. Synergis Proximity Report Westminster Property Ventures has deployed the Genetec’s ‘Synergis Proximity Report’ Along with the system’s new occupancy management capability, Westminster Property Ventures has deployed Genetec’s ‘Synergis Proximity Report’, first deployed at McCormick Place in Chicago, North America’s largest convention center that was repurposed as a COVID-19 field hospital in spring of 2020. Drawing data from the Synergis access control system, the solution allows Westminster Property Ventures to quickly identify individuals visiting one of their buildings, who may have come in contact with someone known to have tested positive for COVID-19 infection. Efficient protection against COVID-19 virus “I’m constantly impressed by the ability of our partners and end users to adapt quickly to changing requirements and bring the latest innovative solutions online to address them,” said Paul Dodds, Country Manager UK at Genetec, Inc. Paul adds, “Westminster Property Ventures’ rapid response to the challenges of the pandemic mirrors our own and validates our investments in technologies that can help make our workplaces safer, healthier and more secure.”
In 2017 alone, 71 prison staff were found to be smuggling contraband into detention facilities in the UK alone. This is a known issue for security officers in prisons around the world, and that is why a major prison in Australia approached UVeye in 2019 about installing intelligent vehicle scanning devices. During 2019 In England and Wales drugs were found 13,119 times in prisons, more than 35 incidents per day, on average. The number of incidents has tripled since 2014, after years of relative stability, with some smugglers taking advantage of new technology, such as drones, to deliver contraband. Self-Made devices The value of the UK prison drug market is an estimated £100 million, according to the Prison Officers Association. Drugs aren’t the only issue; weapons are also being smuggled into prisons at increasing rates. Instruments like wrenches and other self-made devices, usually attached to the undercarriage of vehicles coming in and out of the prison, can violate the rules and cause disruptions. Drugs aren’t the only issue; weapons are also being smuggled into prisons at increasing rates This Australian prison has over 100 regular employees coming in and out. Some of their vehicles have been used to deliver messages to the outside world from gang members who are in detention. Whether the prison staff or bus drivers themselves were paid to smuggle materials and objects in or out of the prison, or a criminal from the outside attached phones or drugs to their undercarriage while their vehicle was parked, this was clearly a matter of concern. Access control systems In other prisons which don’t have an automatic system, there are usually manual inspections conducted by a guard holding a mirror to check the undercarriages of vehicles coming in or out. It is clear in the industry that an efficient technological solution is needed. UVeye facilitates the following things: Securing vehicle access control points Full integration to barriers, bollards and access control systems Tightly securing sensitive areas like the apron of the prison Automatic detection of illicit materials under the vehicle on the first pass Driver and passenger fever detection capabilities SUV delivery vehicles Since most vehicles entering and leaving the prison come in and out regularly, there needs to be a quick and easy experience to compare the vehicles and look for attachments or modifications. The system also needs to be versatile enough to detect anomalies in the undercarriages of a wide variety of vehicle types, from private vehicles to SUV delivery vehicles and armored trucks and buses. Understanding that the quality of inspection and streamlining the entry and exit process is a top priority, the security chiefs of the prison contacted UVeye. They asked for an automatic solution that can compare every vehicle entering or leaving the prison, and that is able to detect any modifications, smuggled devices or illegal weapons entering the facility. High-Resolution cameras Helios UVSS by UVeye is setting the global standard for under-vehicle inspection Helios UVSS by UVeye is setting the global standard for under-vehicle inspection. Equipped with five high-resolution cameras, the system can be installed at the access lane of the prison and automatically detect any illicit materials entering or leaving the prison walls. Offering both single- and multi-lane stationary as well as mobile units, Helios has a feature called UVcompare that enables it to recognize vehicles by their license plate or unique undercarriage fingerprint ID and compare the vehicle to a previous scan. This feature can assist in detecting tiny objects such as letters, paper bags, phones and other contraband. Advanced deep learning algorithms that were developed through training with millions of vehicles allow UVeye to offer its first pass solution, UV Inspect. Providing maximum security Built on a truly intimate understanding of what a wide range of vehicles are supposed to look like in a variety of environmental conditions, UV Inspect can be used for vehicles that have not been previously scanned by a system. UVeye is the only under-vehicle inspection system (UVIS or UVSS) vendor to offer a first verified, first pass solution that greatly increases the effectiveness of security teams. The UVeye team sent its representatives from Singapore for several site visits and worked closely with the construction integrator to provide maximum security and screening for all vehicles coming in and out of the prison. Classifications for items such as tiny paper notes, which in other cases might be considered false positives, were calibrated to be exposed by the system within several seconds, and the security guards will be alerted. Improving staff satisfaction The local staff was trained within several weeks of the installation, and objects like wrenches and boxes were picked up immediately during the early implementation of the system. The queuing time for vehicles entering or leaving the facility is reduced by over 70% As a pass-through system that scans vehicles as they drive over the device at up to 30km/h, the prison’s security team is now able to keep traffic flowing without compromising the quality of its inspections. The speed of inspection with a UVeye undercarriage system is reduced dramatically compared to manual inspection by a guard and keeps the prison staff safe. The queuing time for vehicles entering or leaving the facility is reduced by over 70% these cases improving staff satisfaction. Automated UVSS technology UVeye has simplified the documentation of inspections for the leadership, providing centralized, detailed reports of every vehicle, with the ability to compare past scans, which is often used for different purposes. If there is a case of corruption within staff, the accountability is immediate. Adopting UVeye’s automated UVSS technology has given the prison’s security team a quick and efficient method to monitor all vehicles entering or leaving the facility. In a world where a detention facility’s security is constantly tested, it is important to automate and rely on objective systems that can help prevent smuggled items from reaching the wrong people.
Hicking Building RTM Company Ltd has teamed up with Videx Security and Joes UK Limited to solve a major door entry issue for a large residential complex. The Hicking Building Ltd. is a Nottingham-based development comprising 329 self-contained flats, managed by property agents Walton and Allen. Many residents were struggling with a call issue because the existing intercom system developed a fault which meant residents weren’t receiving calls from the system panels. Because of this, tenants were missing visitors and deliveries with people thinking they weren’t home. Videx GSM 4812 intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system that would also work in conjunction with the existing access control system, where the fob entry element of this was working normally. Joe, who owns and manages Joes UK Ltd., said “The system installed is a very old system and we were struggling to source the repair parts needed to fix the calling issue tenants were experiencing. To fix the problem and reduce the risk of the issue happening again, I recommended the installation of a digital audio GSM 4812 intercom system by Videx that could work concurrently with the fob entry function of the existing solution.” He adds, “With the Videx GSM 4812, when someone calls a specific apartment the call is automatically directed to a registered phone number of the tenant’s, which is usually their smartphone. They now will never miss that important visitor or delivery and are made aware of who has visited even when they are not there and can authorize entry if they wish, while away from their home.” Parallel operations with software-based fob entry solution The Videx system works alongside the existing software-based fob entry solution that residents have used for many years. Mobile phones are now the handset of choice for the majority of people and as they are enabled with Wi-Fi calling, there’s no need to worry about poor mobile signal. If the existing fob system also developed a fault and stopped working, the Videx GSM system includes a preinstalled fob reader so it would be easy to switch this over to the GSM solution. Mark Gibbon, Sales Manager at Videx Security, said “The GSM system is the ultimate entry system of convenience that also provides maximum security too. There’s no infrastructure or wiring involved; it’s very easy to set up and use.” The GSM system is the ultimate entry system of convenience that also provides maximum security Mark adds, “It’s a win-win situation for both the resident and management company because it means residents won’t have to stay home waiting for a delivery, or miss a visitor, as they can answer the call to their apartment from anywhere in the world. For management companies, our GSM solution offers a fixed cost and minimizes the risk of call outs because there’s no handset maintenance involved.” Remote event log with online access A really useful feature of the GSM system is that it also carries a new remote event log that can be accessed online, allowing events to be viewed in real time, on the move via a phone, tablet/laptop. It’s a great security feature because it’s where a record is kept of calls, gate/door openings and much more. What’s also useful is that alerts can be programmed where an email will be sent should that alert be triggered. For example, if the gate or door is opened out of normal hours or if the registered number for a flat or property is changed too frequently - any unusual activity is flagged.
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to consumers by the operator, and in the operator’s cloud-native environment. The services are expected to be made available to millions of the operator’s fixed broadband customers. The operator has ordered an enterprise-wide perpetual license from Allot. According to the Microsoft Security endpoint threat report 2019, the malware encounter rate in APAC was 1.6 times higher than the global average. In light of these conditions, Allot HomeSecure gives telecom providers in APAC a unique opportunity to deliver zero-touch, fully automated services that protect their customers while generating supplemental revenues. Security for home IoT and smart home devices Allot HomeSecure provides security for home IoT devices and smart appliances Allot HomeSecure provides security for home IoT, smart appliances, and the devices connected to the home network. It integrates into the existing home router with the addition of a thin software client that provides home network visibility, cyber security and parental controls without the need for any configuration by the consumer. Allot HomeSecure uses AI to identify and profile connected home devices and to detect and act upon anomalous device behavior. HomeSecure has the option to be managed from an easy-to-use app for every household that gives consumers control over their network security and parental controls. “Our customer in APAC sees anti-malware protection for all home-connected devices and parental controls as basic requirements for any offering they provide to their millions of fixed broadband customers. HomeSecure gives them a single zero-touch clientless solution that satisfies both of these demands,” said Ran Fridman, EVP Global Sales at Allot.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload