Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million peopl...
Virtualization offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged Infrastructure Solution “ISC West attendees were...
Memoreyes, the developer of a smart, first-of-its-kind outdoor video surveillance system, is looking for qualified integrators to participate in its national dealer program. The company will provide integrators with training that centers on its patent-pending, Megapixel/HD–quality, pan-tilt-zoom camera system with machine learning. Memoreyes’ unique video offering provides an unprecedented set of advanced, almost human-like capabilities. Deter Criminal Activity “Integrators...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated Systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX Camera Platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensor...
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercializes a complete range of personalization and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group's business development and establish a long-term presence in Japan. Evolis Japan K.K. Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers, expand the traditional distribution network, develop channels dedicated to new industry sectors, and strengthen response to the demands of government bodies and financial institutions."Japan is one of the world's leading economies with more than 125 million people. We therefore see strong potential for card personalization in several markets. The creation of a Japanese company will help in our existing business relationships and facilitate the development of new partnerships" says Eirik Bakke, Managing Director, Evolis APAC. On-Site Encoding And Securing Key Cards Evolis systems allow for the on-site personalization, encoding and securing of cards that support various applications, such as access control badges, debit and credit cards, ID cards, resident permits, drivers' licenses, transport passes, student IDs, as well as product tags for the retail and hospitality market.Evolis' solutions support any requirement in card personalization, from basic printing in small runs up to the personalization of advanced and secured cards in large volumes. Numerous governments, financial institutions and large retail chains are using Evolis' card personalization systems to issue their cards. Card Personalization Systems Due to its flexible manufacturing capabilities and technical expertise, Evolis meets stringent customer demands in terms or technical features, quality and delivery lead times. A project team is dedicated to designing specific and tailored solutions, recognized at national and international levels.
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for access control applications. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records Access control is critical for healthcare institutions in order to protect patient safety and meet stringent HIPAA requirements for medical information privacy. Radio frequency identification (RFID) readers are an effective and efficient means of user authentication to ensure that only authorized personnel can access patient health records, change settings on medical devices or gain access to restricted medications, equipment or supplies. Better Security Than Passwords RFID readers are more secure and easier to manage than passwords, which are easy to share and often forgotten, creating both security risks and an unnecessary IT burden. Password systems also slow down medical personnel, requiring them to remember and enter passwords into different devices, often under emergency conditions or extreme time pressure. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records, supplies and equipment they need to perform their jobs. ELATEC readers are already widely used for secure print management and other healthcare ecosystem applications such as time and attendance, computer single sign-on, room scheduling, pharmaceutical and high-value supplies dispensing, and medical equipment access control. Recognize 60+ RFID Proximity Card Transponders ELATEC RFID readers can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone BLE and NFCThere are dozens of RFID card technologies in use globally, creating challenges for hospital systems and device manufacturers wishing to implement RFID for access control beyond the front door. While other systems only recognize a few proprietary technologies, ELATEC RFID readers are universal. They can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone Bluetooth Low Energy (BLE) and Near-field Communication. They are also certified for use in 110 countries. This means that large hospital systems that may be using multiple card technologies across different locations due to mergers and acquisitions can rely on a single reader type for access control and user authentication for all the other devices and systems they use. For medical device manufacturers and software developers, ELATEC readers provide a ‘single part number solution’ that allows them to sell their RFID-enabled devices into practically any hospital system throughout the world without worrying about what kind of card technologies their clients may be using. Cost-Efficient And Longer Durability "We describe ELATEC’s readers as being future proof,” explained John Tepley, President of ELATEC USA, Inc. "There are numerous technologies used for various applications throughout the region and the world, which means companies that want to integrate RFID into their solutions must be prepared to handle many different RFID transponder technologies. ELATEC is uniquely positioned to meet these challenges." ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements, so they are inexpensive to maintain and will remain usable longer than competing reader technologies. As the healthcare ecosystem becomes more connected and complex, and the FDA puts increasing emphasis on cybersecurity risks for medical devices and software applications, developers need smart, easy solutions to close security vulnerabilities around user access and authentication. RFID provides fast, easy and secure authentication for all kinds of medical devices and applications. ELATEC readers can help developers meet emerging security challenges and address the needs of their healthcare clients.
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. Diary Management Processes VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organizations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. Important Additions A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. Security Investments The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" These latest integrations include IP intercom hardware from Jaquies; the mobile phone app GuardPoint; and the Metra locker system hardware. For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform, says Lee Copland, Managing Director, Maxxess EMEA. “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Allows Security Controllers Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone-Worker Monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations. With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Better Optimized Workforces “We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organizations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimized workforces across security and facilities management functions.” “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Inner Range access control products all include intruder detection systems certified as Grade 3, according to European Standard EN50131-1. The grading system reflects how skilled and prepared intruders might be. Grade 3 (on an ascending risk scale from 1 to 4) assumes intruders will have some knowledge of an alarm system and a comprehensive range of tools and portable electronic equipment. Many insurance companies will not provide business cover unless a Grade 3 alarm system is in place. Effective Solution Tim Northwood, General Manger at Inner Range, said: “Our intelligent access control systems always offer high quality intruder detection as standard. We know security is paramount, regardless of whether customers are looking for an Entry or Enterprise level product. So we ensure all our products include certified Grade 3 alarm systems.” Wireless devices, such as wireless motion sensors, can also be fitted to Inner Range products via partner companies Inovonics and Paradox He further added, “Combining intruder detection with access control also means customers don’t have to buy, install and maintain two separate systems, saving time and resources while also providing a more effective solution for access and security challenges.” Wireless devices, such as wireless motion sensors, can also be fitted to Inner Range products via partner companies Inovonics and Paradox. This is helpful for some listed and public buildings where wiring is difficult or prohibited for aesthetic reasons. Wireless systems are certified as Grade 2 but in some cases provide the only security solution. Multi-Application Support High levels of security feature throughout Inner Range systems. For example, the manufacturer’s access cards include MIFARE DESFire EV2 chips. These offer excellent security, privacy and multi-application support. Their Sifer readers deploy 128bit AES encryption from the card through to the door module, providing a far superior level of security than traditional Wiegand based card readers too. Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 130,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centers and pharmaceutical companies. government and critical national infrastructure.
Rave Mobile Safety (Rave), a trusted partner for safety software protecting millions of individuals, released key findings from its 2018 survey, Emergency Preparedness and Security Trends in Healthcare after polling hundreds of healthcare safety leaders across the United States. The survey results, which will be revealed in a webinar on Thursday, October 25, examined the current and most pressing emergency concerns for hospitals and healthcare facilities. Specific building emergencies, such as fire drills, are priorities, but the responses from these professionals unearthed discrepancies about what emergencies and adverse events actually occur and the preparedness plans healthcare facilities have in place. Safety Issues Faced By Healthcare Facilities The three most pressing safety issues cited are severe weather (36 percent), active shooter incidents (34 percent), and cyberattacks (32 percent)"Hospitals and healthcare organizations greatly contribute to the well-being of others and emergency communications and preparedness are a very important part of their operations," said Todd Miller, COO of Rave Mobile Safety. "The healthcare industry is undergoing many changes. Mergers and acquisitions, as well as the decentralization of hospitals and healthcare facilities into smaller outpatient and acute-care facilities, are changing how the healthcare industry operates. Healthcare professionals must think about how this will affect security and emergency preparedness across their organizations." The Emergency Preparedness and Security Trends in Healthcare survey found that the daily emergency incidents healthcare organizations experience doesn't correspond to the biggest safety concerns respondents reported. The three most pressing safety issues cited are severe weather (36 percent), active shooter incidents (34 percent), and cyberattacks (32 percent). However, 93 percent did not experience an active shooter incident in the last two years. In fact, the most common day-to-day incidents they experience are system outages (54 percent), closely followed by weather-related events (53 percent). Communication Methods During Emergencies When it comes to fire drills, 60 percent of respondents conduct them every quarter, even though only 18 percent had a serious fire-related incident within the last two years. These drills are especially helpful to ensure a smooth approach to any actual emergency. The survey reveals that email is the most commonly used channel for communication during a variety of situations "During the times of crisis, patients, employees and the larger community expect hospitals to maintain operations without any interruption," said Kevin McGinty, safety and emergency management coordinator at Middlesex Hospital in Middlesex, Conn. "An emergency communications process that operates smoothly, quickly and with minimal intervention is key. Maintaining a common operating picture, especially with geographically separate facilities, is critical during events." Hospitals and healthcare facilities depend on fast and efficient communication methods during emergencies to keep their staff informed, as well as to communicate with patients, contractors and other visitors on-site. The survey reveals that email is the most commonly used channel for communication during a variety of situations, from workplace emergencies to finding shift coverage. Hospitals and healthcare facilities also use different methods of communication, including mass text messaging and phone tree/automated voicemail, when they connect with on-site employees. Growth Of Healthcare Facilities However, communication methods vary widely when respondents share information with hospital visitors and traveling employees. Organizations mostly communicate with visitors using digital signage (64 percent), intercom communication systems/building alarms (29 percent), and email (19 percent). For traveling employees, such as those in a satellite clinic or a patient's home, only 51 percent of organizations are sharing information with them through text message and 49 percent through automated voicemails or phone trees. Rave Mobile Safety's Miller will be joined by industry experts, McGinty and Turek, for a webinar to review the survey results"Healthcare systems are growing at an unprecedented rate and are expanding beyond hospital settings to include clinics, specialty facilities and administrative offices – something we haven't dealt with previously," said Patrick Turek, system director of emergency management at Hartford HealthCare in Hartford, Conn. "We now have hundreds of different departments and a mobile workforce that is moving to various sites throughout our system. They expect that their emergency communications are uniform and on their device of choice, regardless of where they are located." Lack Of Weather-Related Emergency Testing As serious weather-related incidents, such as hurricanes, tornados, flooding and wildfires, continue to rise, hospitals and healthcare facilities must have procedures in place to keep their communities safe. More than half of respondents said they experienced a serious weather incident within the last two years, yet 51 percent reported their facilities have gone over a year without testing their weather-related emergency plans. This is contrary to the recommended twice-a-year testing by the Joint Commission on the Accreditation of Healthcare Organizations. Rave Mobile Safety's Miller will be joined by industry experts, McGinty and Turek, for a webinar to review the survey results on Thursday, October 25. The discussion will also address why safety requirements in hospitals and healthcare facilities are unique compared to other industries, as well as the importance of implementing and testing security procedures throughout the year.
LifeSafety Power Inc., global manufacturer and creator of a new category of intelligent power solutions, brings critical resiliency, redundancy and networking capabilities with the release of Helix Armour. Designed for seamless failover protection with automatic backup switchover of AC or DC circuitry to reduce the risk of system downtime or outage, Helix Armour sets a bold new standard in reliability and network power management for mission critical physical security and life safety applications. Helix Armour Helix Armour minimizes the risk of failures that could compromise system integrity by providing both AC and DC redundancy Helix Armour minimizes the risk of failures that could compromise system integrity by providing both AC and DC redundancy in the event of problems with the power supply or incoming AC power. Featuring network management, it provides predictive network reporting that optimizes and maintains the highest levels of performance and connectivity to critical applications and devices. Standout Features Of Helix Armour Include: Monitors separate AC branch circuits reporting trouble with a primary branch immediately and instantly transferring power to backup for uninterrupted system operations in critical access control or security systems, as well as banking, gaming, pharmaceutical, Sensitive Compartmented Information Facility (SCIF) and data room servers. Redundant and mirrored power supplies also monitor and report DC integrity. In the event of a power system failure, the solution transfers to the secondary power supply without dropouts or voltage spikes. With LifeSafety Power’s patented NetLink networking technology at its core, Helix Armour detects and reports system wide anomalies or power trouble across the enterprise so critical infrastructures stay properly secured. With multiple Underwriters Laboratories listings and certifications, Helix architecture is especially designed for mission critical applications in government, finance, medical and high-tech industry vertical markets. Network Power Management Helix Armour brings the highest levels of redundancy, reliability and networking management to power services" “Helix Armour brings the highest levels of redundancy, reliability and networking management to power services across even the most highly regulated and mission critical enterprises,” said Guang Liu, Co-Founder and Chief Technology Officer of LifeSafety Power. He adds, “The ability to provide both AC and DC redundancy, in a proactive, real-time manner and with zero latency and automatic switchover in the event of a power anomaly establishes Helix Armour as a true total assurance solution for end-users in the most challenging markets and environments.” Helix Armour is part of LifeSafety Power’s expanding patented, modularly designed technologies made in the USA and is available in wall or rack mount configurations.
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organization. Risk Stratification And Control Objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-Factor Authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organization can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organization. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organization. This issue is so important – once we institute risk acceptance, our organization suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions.Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organization? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organization to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organization’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organization’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: Prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: How do we all, collectively, keep up? More critical is finding ways to offer or utilize new technologies and total solutions that make operations easier Ensuring Security Preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training In New Security Solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying An End Goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilizing new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing Access To Buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing Security Partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry Collaboration For A Secure Future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilizes the existing WiFi infrastructure in a building to create a personal, mobile safety device built to save lives — all while reducing infrastructure and cost. Tragedy Informing The Industry The tragic and unfortunate events that occurred in 2017 and in the years prior, such as mass shootings and natural disasters, have made adding layers of security a prominent trend in 2017. Soft targets have unexpectedly become the focus of many attacks, placing an even more significant emphasis on determining how to protect individuals within a campus. Visitor management was a key trend VuTeur focused on this year and will continue to concentrate on, as many security issues tend to stem from an uncertainty of who is in a building at any given time. Securing all types of campuses will continue to be crucial into 2018. Schools, healthcare facilities, stadiums and arenas, and other organizations face the challenge of maintaining a welcoming and friendly environment, while understanding and monitoring who is in the facility and properly safeguarding the area. Stadiums and arenas face the challenge of maintaining a welcoming and friendly environment, while properly safeguarding the area The security industry will continue to trend upward, which will help push new technologies, such as VuTeur's, that augment perimeter and building safety in every vertical. What’s To Come Next year, VuTeur's technology portfolio will expand, and we plan to establish deployments in a variety of applications, such as on educational campuses, hospitals, arenas, corporate campuses and government facilities. Communication will remain critically important in the event of an emergency, making RTLS technology extremely valuable for conveying routine- and threat-based messages. Integration will also be a significant trend in 2018, as it is vital for security systems to "talk" to each other, such as RTLS talking to access control and mobile devices, to create a more holistic approach to protecting assets and people.
No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth Of Mobile Credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of companies supplying a mobile credentialing system to the market. Lenel’s Blue Diamond mobile credentials are based on technology developed by United Technologies sister company Supra. The use of a cell phone (by Supra) to open a real estate key box has already been adapted to the hospitality industry (with a deployment at Hilton Hotels), and now as an access control credential, part of Lenel’s OnGuard Version 7.3 release for the commercial and industrial security market. The components of the system are a Bluetooth reader, a virtual credential provided through a smart phone app, a cloud-based credentialing portal, and integration with the latest version of OnGuard. Offering a full solution is simpler to implement, and Lenel even has an “in-line” Bluetooth reader that can be used to add Bluetooth capabilities to existing systems. It’s just one aspect of the OnGuard 7.3 release that also is “reinventing the OnGuard experience,” according to Ross McKay, Lenel Systems International’s Director of Project Management. Future Adoption Mobile credentials are big talk at ASIS, but how long before they will be widely used? Estimates are all over the map, but research firm IMS has projected the percentage adoption of mobile credentialing at 19 percent by 2020 (according to McKay of Lenel). "Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately, anything you can give them on a phone, they will use" But Steve Van Till, president and CEO of Brivo, which launched its mobile credentialing system at last year’s ASIS, sees a range of possibilities in terms of adoption. Witnessing the fast adoption of smart phones as alternatives to perform a large number of daily tasks, some say mass adoption could only be a couple of years away. On the other hand, in our market, a lot of people are still using proximity cards (despite introductions of superior alternatives over the years). That legacy argues for slow adoption indeed. “Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately,” says Van Till. “Anything you can give them on a phone, they will use.” Because ASIS is an end user show, exhibitors tend to reflect on the changing dynamic of selling to end users. Changing Purchasing Dynamics How end users buy products may be changing -- obviously the IT department is having a greater influence than ever before. But what hasn’t changed is the importance of creating a system that will keep end users satisfied as they use it day-to-day for years after the installation is complete. IT may be yielding more influence, but at the end of the day, it’s the security customers -- the attendees at ASIS -- who must be satisfied. “While the IT infrastructure and personnel are involved in how decisions are made, security personnel are still heavily involved,” says Sharad Shekhar, CEO of Pelco by Schneider Electric. “On a day-to-day operations level, it’s the security user who either truly benefits or gets truly hurt by the product. We face IT challenges up front, but the day-to-day utility of our products in the market is judged by the security people, not the IT people.” Shekhar says feedback from those day-to-day end users is one factor that makes a show like ASIS so important. “We need to get continuous feedback to guide our future product development,” says Shekhar. “The type of people who do security -- they like stability. They like certainty because it’s the nature of the business. They want to apply solutions that have been vetted, that are proven. Customers can’t afford to make a mistake.” "The type of people who do security - they like stability. They like certainty because it’s the nature of the business" At ASIS, Pelco is showing its VideoXpert open video management system (VMS) platform, integrated with the Optera multi-sensor panoramic camera. The ability of the VMS to display a seamless multi-sensor image is getting good feedback from customers. Pelco’s core strategy is to focus on four major verticals -- gaming, city surveillance, oil and gas, and ports. They devote a range of resources to each of the major verticals, including multi-functional teams including research and development, engineering, product support and marketing personnel. A fifth core vertical in the United States is corrections, and Pelco also sells in secondary verticals such as education, healthcare, etc., although they are focusing more on the core verticals. Education And Training Education is an important aspect of the ASIS show, there are rooms and rooms of educational sessions on a range of topics going on concurrently with the trade show. But education is also happening on the show floor, often in the form of presentations from vendors in theater-like areas of their booths. Promise Technology, a manufacturer of storage systems, is a first-time ASIS exhibitor that is providing educational sessions in their presentation theater in cooperation with VMS partners. “There is a lot of information in education and training,” says John van den Elzen, Managing Director, Worldwide Surveillance Business Unit, Promise Technology. “End users like to know how a solution is working. They don’t want to hassle with it if it doesn’t work. We qualify all the VMS vendors before the product comes to market. We know it works. We have a good relationship with the VMS vendors and work together if there is a problem -- no finger-pointing.” Promise provides RAID storage systems that are specifically targeted to the security market, and promote the products using security terms rather than IT terms. And they listen to feedback, whether at a trade show or at the many education events they have held globally to growing numbers of attendees. “This is very successful,” says van den Elzen. “People have a lack of knowledge and we look to fill in that gap.” There’s more knowledge to be had, and more exhibitors to visit in the second day of ASIS.
End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15 percent to as many as 25 to 40 percent of openings. Access Control For Data Centers Openings don’t just mean doors – it could mean a lock for a prescription drug cabinet in a hospital or physical access to a server in a data center. I caught up with ASSA ABLOY at AMAG’s Security Engineering Symposium (SES) 2016. AMAG and ASSA ABLOY are technology partners – AMAG’s Symmetry access control system is integrated with ASSA ABLOY’S IP-enabled locks. Our discussion covered changing locking trends – and new opportunities for consultants, integrators and end users. “It used to be enough to secure the perimeter of a data center, for example” says Jim Crowley, ASSA ABLOY’s Electronic Access Control (EAC) OEM Business Development Manager. “But now customers want to be able to secure the actual rack the server blades are in. In a co-located data center, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data.” Regulations are driving some needs for new locking solutions. In the data centerscenario, protection of medical information required by HIPAA [the U.S. Health Insurance Portability and Accountability Act of 1996] is driving the need to secure various openings – there are hefty fines for any violations of HIPAA rules. "It used to be enough to secure the perimeter of a data center, but in a co-located data center, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data" “If you look at the regulatory environment we’re in today, NERC (for the electric utility market) and HIPAA and those types of regulations are requiring that openings have auditability,” says Crowley. “You need to know which people have access to openings both proactively and on a forensic basis. That’s driving access control further into the enterprise and onto openings that you historically didn’t see.” [NERC is the North American Electric Reliability Corp.] Wired Vs Wireless Locks “There’s no one-size-fits-all solution,” adds Chapman. “You want to be able to offer a locking solution based on needs and budget, and you have a lot of options.” While every lock cannot be wired, it’s also true that many applications don’t lend themselves to wireless solutions. A strategic mixture is the best approach. “We are not trying to displace all hard-wired doors with wireless,” says Crowley. “There will always be a need for wired and wireless – they’re complementary, and not mutually exclusive.” He also notes that wireless locks use AES 128-bit encryption to ensure security. “We are always looking to improve the security of that wireless transmission, but some people have it in their head that wireless is not secure, which isn’t the case.” However, because concerns persist, ASSA ABLOY just came out with Wiegand wired versions of its cabinet locks and server cabinet locks. Some data centers just don’t want wireless locks in their facility. Adopting Cloud Security Solutions Another development is cloud applications for the light commercial market, which offer an attractive price point that combines security and convenience. “When folks talk to me about being concerned about security in the cloud, I ask them: How do you do your banking? If you’re using your bank’s Web-based services, your entire financial life is in the cloud.” When developing its variety of locking solutions, ASSA ABLOY is always listening to the voice of the customer, says Chapman. “We want our solutions to be innovative and customer-centric, with everyone having a good user experience – including our OEM partners, channel partners, integrators and end users.” The company has teams of people who constantly call on integrators, security consultants and architects, as well as owners and users. “We are constantly evolving, and we want to take whatever necessary steps to make doing business with ASSA ABLOY easier.”
We all know that security video cameras are becoming smarter. The IP cameras at the edge of today’s video surveillance systems contain computer chips that can potentially change how cameras are used. However, despite the changing technology and greater intelligence at the edge, today’s systems mostly use video cameras for one thing – to provide video. In some cases, the cameras provide hours and hours of video that no one will ever watch. Re-Examining The Role Of Video Cameras Prism Skylabs is helping to drive a re-evaluation of the role of video cameras in the market. Founded in 2011, the San Francisco cloud service company thinks of IP cameras as sensors that are capable of providing a range of data that can be managed and processed in the cloud to provide more useful information to end-user customers. Prism’s current implementations of the “software as a service” approach focuses on retail merchandizing and marketing applications, but Prism Co-Founder and Senior Vice President Bob Cutting sees many other opportunities too. The cloud infrastructure provides a “reliable and continuously connected way to monitor and get data from cameras that is extremely robust and reliable,” Cutting says. Information from cameras “trickles up” to the cloud where data is “pre-extracted and available,” helping retailers optimize their store designs and marketing. Prism provides a blend of complementary visual and analytics data. "We looked at the camera andreimagined what it can do as a realsensor – a sensor with intelligencethat is cloud-ready, cloud-enabledand easy to install. How we think ofvideo has to change" Retail Applications Of Video Analytics In the retail world, the approach enables marketers and merchandisers to constantly observe and monitor retail displays and customer activity from around the world in real time. Store owners can tell, for example, if their stores opened on time. Did a new product launch effectively? “There are hundreds of questions that retailers want to answer, and they don’t want to watch streaming video from the store,” Cutting says. “They just want answers to questions.” He says the system provides “an easy way to navigate and access data.” If you think of a camera as an intelligent sensor, the data provided by that sensor can take many different forms (and only one of them is “streaming video,” which may not be the most useful for a specific end user need). Cutting says the data is “privacy enabled,” and does not contain personal information. Integrating With CCTV Manufacturers Prism has integrated its cloud system with cameras from Digital Watchdog, and announced integration with Axis cameras at the recent ASIS International show in Anaheim. The company is also in the process of integrating with several other large camera manufacturers in the video surveillance market. Employing intelligent cameras at the edge, the company “saw overnight a shift from server-based solution to an edge-based camera solution.” “It’s the right form factor,” says Cutting. “We looked at the camera and reimagined what it can do as a real sensor – a sensor with intelligence that is cloud-ready, cloud-enabled and easy to install. How we think of video has to change.” Role Of Video Analytics In Store Security Security cameras are capable of providing up to a dozen additional outputs, combining data with visual elements, says Cutting. For example, intelligent cameras can count people, and can track movement of customers in a store based on defined rules. An end user can know how many people go down a certain aisle, how long they dwell in front of a display, how many people visit a certain area in a given time. Cameras can also provide “visual summaries” of activity in a store, showing graphically who went where over a certain period of time, providing retail traffic maps, heat maps, and other visual outputs to guide store owners and managers. Cameras can also provide “visualsummaries” of activity in a store,showing graphically who wentwhere over a certain period of time,providing retail traffic maps, heatmaps, and other visual outputs toguide store owners and managers Finally, cameras can provide a variety of visual data (in addition to streaming video). These include video snapshots (high-resolution images taken periodically and delivered in high resolution to the cloud). Visual outputs might also include “background models,” which are images of retail shelves presented without the customers moving in front of them to provide a detailed view of products and how they are arranged on the shelf. There are also other types of visual outputs, such as time-lapse video, and thumbnail images taken one frame per second. In effect, the visual output is matched specifically to what the end user wants to see – and one camera can be used for multiple outputs to meet the needs of various stakeholders. (Cameras can also provide outputs focused on the needs of loss prevention and security departments.) Examples And Applications Of Retail Analytics Lolli and Pops, a 26-store candy chain, is using the system to change the candy store experience. Using the Prism Skylabs system, the company tests multiple combinations of merchandizing displays, and measures the effectiveness (and maximizes the benefit) of each. The company employs A/B testing – one display in one store and a different display in a second store – to measure which approach works best, in effect fine-tuning the retail experience for customers. Another Prism customer is a large retailer deploying the system throughout Europe, leveraging the system’s ability to count, provide visual insight and understanding, and real-time visibility into the effectiveness of merchandizing displays (using a 25-point checklist to ensure compliance). Other potential end-markets include retail banking, hospitality and even casinos – “anyone who wants a better understanding of their space,” says Cutting. He says there is a growing opportunity for physical security integrators in the area of retail analytics, and use of cameras as sensors conforms to emerging industry trends such as “Big Data” and the “Internet of Things” (IoT). He asks: “How can we break down video into core components that are IoT-friendly and that a wider audience can use?”
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardized system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilizes a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-Friendly Features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photo Caller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access Control And Intruder Detection System In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety Of Staff And Visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers Smart Building Management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key Features Available With Inception: A web-based interface that can be controlled by authorized staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits For Client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Texas A&M University-San Antonio (A&M-SA) has become the first university in the world to deploy an Indoor Positioning Solution across its entire campus for the purpose of providing the safest possible environment. The SafeZone indoor positioning solution, provided by CriticalArc, provides the campus police with an unprecedented three-dimensional view of multi-story buildings. For example, instead of receiving an alert about ‘an incident somewhere in the student union building’, they get pinpoint specifics, such as ‘it’s on the fourth floor, west wing, outside room 410’. "With indoor positioning and SafeZone, we're able to provide a faster response time, whether it's a medical emergency or an active shooter,” says Roger Stearns, A&M-SA’s assistant chief of Police, featured in this video. The entire police department benefits from advanced features such as heat mapping and incident playback to optimize performance" Safer environment for students The university’s Chief of Police Ron Davidson wanted to innovate with this full-coverage system because the campus was expanding, including a newly completed residence hall, which meant having students around the clock for the first time in A&M-SA’s history. He was committed to ensuring a safer environment for students, staff and visitors. In addition, Chief Davidson was in search of a common operating view that would provide the Emergency Operations Center and all officers on patrol a real-time location of all available officers and volunteers, as well as showing the location of all incidents ̶ essential for coordinating first responders and the Campus Community Emergency Response Team (CCERT). Heat mapping and incident playback “SafeZone is essential technology to position your organization on the cutting edge of campus law enforcement. The real-time common operating view both enhances officer safety and acts a force multiplier. Plus, the entire police department benefits from advanced features such as heat mapping and incident playback to optimize performance,” Davidson said. Texas A&M-San Antonio has adopted the indoor positioning solution as a standard and will deploy it in all future buildings on campus. The solution is fully supported by the University’s Information Technology department and has been assessed for additional applications to enhance the student experience including wayfinding and research by academics in the newly completed Science and Technology building. Easy to maintain wireless installation The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain"SafeZone was easy to deliver with no disruption to the campus. It was deployed in a matter of weeks during the summer break. “The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain,” added Stearns. Organizations can install wireless, wearable duress alarms able to pinpoint anyone anywhere on campus as an alternative to fixed, expensive, wired panic alarms. Among other capabilities, SafeZone allows users to get the most rapid help simply by activating an alert, using an app or a wearable duress alarm. As soon as the alert is triggered, the location and details of the user are streamed to the monitoring team, allowing officers to coordinate a smarter, more targeted response. By enabling responders to visualize the precise location of an incident, anywhere on campus, SafeZone is much more powerful than traditional, fixed panic alarms and blue light telephones, which are more expensive to install and less accurate in operation. SafeZone public safety solution Glenn Farrant, Chief Executive Officer, CriticalArc, notes; “I’m delighted by the close partnership between A&M-SA and CriticalArc resulting in this ground-breaking implementation of the SafeZone public safety solution. Chief Davidson and his team are at the forefront of using this technology and we are pleased to be helping them improve the quality of life, and the learning experience, for everyone on their campus.” The SafeZone indoor positioning solution is commercially available worldwide for a range of university, hospital, enterprise and finance applications and is being deployed in more than 80 countries worldwide.
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centers, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wireless escutcheons have been installed across the CPN premises integrated with the access control system from Delta Security Solutions, most on the doors to patients’ rooms. Now, everyone the ability to circulate freely without needing to carry a cumbersome key. Tracking Door Security In Real Time Because the Aperio integration at CPN is online, security staff can now keep track of all door security in real timeBecause the Aperio integration at CPN is online, security staff can now keep track of all door security in real time — which was not possible with the old mechanical master-key system. If a resident loses their credential, facilities staff simply cancel it instantly and reissue another, ensuring security at the site remains intact. Some dorm-style rooms at CPN have multiple beds; in these, Aperio escutcheons secure cupboards for every inpatient, so their personal belongings are kept safe without physical keys or needing to remember PIN codes. The old key-operated safes have been removed, saving CPN the recurring cost of re-keying or replacing safe locks. Securing Pharmacy And Medicine Store The Aperio H100 handle packs the power and flexibility of Aperio wireless access control into one slim interior door handle“Previously when a unit key was lost, we would have to change every cylinder it opened — which for some keys would be very expensive,” says Cédric Marchal, technical services engineer at CPN. At CPN, Aperio devices also secure areas where residents are not permitted, including staff rooms, offices and sensitive zones like the pharmacy and medicine store. Alongside the escutcheons deployed at CPN, the Aperio device range includes online and offline Aperio cylinders; an online security lock; a wireless lock for bringing server racks and cabinets into the same access control system as doors; and the new Aperio H100 handle, which packs the power and flexibility of Aperio wireless access control into one slim interior door handle. Every year since 2011, CPN have budgeted for an expansion in their Aperio system. Every year, more doors at their site are covered — enhancing the safety and well-being of patients. Enabled by Aperio wireless access control technology, the upgrading process continues.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced Estill County Emergency Medical Services, located in Irvine, KY, is successfully using infinias access control from 3xLOGIC to improve security and give hard-working staff needed peace of mind to focus on their important work. Bates Security, Lexington, Kentucky, designed, installed, and oversees the system. Shelia Wise, in charge of accounting and training for Estill EMS, oversaw the process to upgrade security at the County’s EMS facility. “We were looking to secure a building that is in operation 24/7/365.” Working on behalf of the County EMS’s Board of Directors, Wise and her team assembled three bids and in the process got a real education on access control, what different systems can do, and what their real security needs were. Securing The Medical Room Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here"“Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here, but also when they need to clear out at a moment’s notice,” explained Wise. Ultimately, the Board of Directors choose inifinias access control because it met the wide-ranging needs of the County EMS. “We chose the best system for the price and the feature set,” said Wise. Installation was completed about two years ago and the infinias system manages a total of six doors at the main EMS building, two of which are internal, including the medical room where drugs are stored. Later, two more doors were added at a sub-station location. “A top concern is the medical room,” said Wise, “I have to be notified when someone is accessing that door. Now, I get an alert anytime someone is attempting to access that secure room anywhere I am, I don’t need to be onsite. Wise and other staff manage their eight doors from a single interface, by any computer with an Internet connection—anytime, anywhere. Access Management For Employees “It was important that I could easily operate the system software without help from anyone else. And Sean Moberly from Bates is always available for questions and any maintenance that’s needed. It’s a great feeling to know that when we’re away doing our jobs all our worldly possessions back at the facility are protected and we don’t have to worry,” said Wise. The infinias system manages access for all employees, some outside contractors, and the Chairman of the Board of DirectorsEstill County EMS has 35-40 employees and at any given time upwards to 15 people are at the main station on a daily basis. The infinias system manages access for all employees, some outside contractors, who do radio and computer maintenance, and the Chairman of the Board of Directors. Ms. Wise also grants temporary access to hospital staff who use the facility for training. User-Friendly Access Control System As the main administrator, Ms. Wise has created five different sub-groups among all employees and visitors, providing each group with the access privileges they need to do their jobs, while ensuring that only a few individuals have full access to all doors and areas. “I think the system works really well. There was a short learning curve, but it’s quite user-friendly and we’ve not had any problems. From what I was told at our original meeting with Bates through operations today, we got exactly what we user-friendly, and we’re very satisfied,” Wise concluded.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?