Nortech announced its most advanced NVITE multiple technology reader, designed for contactless identification. The NVITE supports a wide range of credential technologies including QR, Proximity Cards, Smartcards, BLE and NFC, making it an effective access control reader. The NVITE solves one of the major issues in larger sites with multiple facilities and mixed technology credentials, by providing an all-in-one reader solution. It also simplifies the transition from one technology to another wi...
ELATEC, a globally renowned manufacturer of innovative multi-frequency RFID readers, will have a new CEO as of July 1, 2020. Robert Helgerth takes over the management of the company and will set the course for the company's growth in the future. In Robert Helgerth, who was most recently responsible for Microsoft's partner business in Asia, ELATEC has gained a visionary manager with great expertize in the strategies, structures and processes of internationally successful corporate management. E...
Pulse Secure, the provider of software-defined Secure Access solutions, announced successful integration and joint compatibility testing between Gigamon and Pulse Secure to ensure customers that Pulse Secure’s Network Access Control (NAC) solution, Pulse Policy Secure, can fully leverage the endpoint contextual information received from Gigamon as remote workers return back to their office. The combination of Gigamon and Pulse provides organizations real-time visibility of network-connect...
Connect ONE by Connected Technologies presents a new cloud badge printing integration with the InstantCard ID Card Service, allowing dealers to easily expand into offering customized identification badging and credentialing as part of their menu of services while earning additional revenue. API with InstantCard Connected Technologies developed the Application Programming Interface (API) with InstantCard so dealers can use the powerful cloud-hosted Connect ONE security management platform to cr...
DigiCert, Inc., the provider of TLS/SSL, IoT and other PKI solutions, and Valimail, the provider of identity-based anti-phishing solutions, announce that they are partnering to help companies prepare for Brand Indicators for Message Identification (BIMI), a new standard currently in pilot that allows companies to display a verified logo in emails with a Verified Mark Certificate (VMC). “DigiCert is pleased to partner with Valimail to support pilots that advance the BIMI email security sta...
Device Authority, a global provider of identity and access management (IAM) for the Internet of Things (IoT), announced the availability of KeyScaler in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Device Authority customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management. Device Authority's KeyScaler platform solves one of the biggest challenges of IoT: onboarding dev...
As hospitals, manufacturing establishments, large retail stores, and public-facing businesses strive to put in place health screening measures to minimize the risks of outbreaks, they often have to rely on manual processes that are time-consuming and error-prone. To address the challenge, Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions is working with customers on new ways of using Genetec Mission Control, the decision support system of Genetec Security Center, to help automate the screening process for employees and visitors entering facilities. Decision management system Mission Control also keeps track of every step of the response process, enabling comprehensive after-action review Genetec Mission Control is a collaborative decision management system that is already widely used by airports, critical infrastructure organizations, and security departments to coordinate incident response through greater situational intelligence and guided action. Designed to eliminate doubt, it filters out noise to provide the essential data, insights, and tools needed to respond to situations quickly and collaboratively. Mission Control also keeps track of every step of the response process, enabling comprehensive after-action review and continuous improvements to standard operating procedures. Mission Control can also be used to streamline screening processes and ensure accurate record-keeping. Maintaining safety compliance The system digitizes the screening questionnaire used by the organization and walks admission personnel through each step to identify individuals requiring additional assessment. It also centralizes the data collected and automates supervisor notification. With Mission Control, customers can significantly speed up the screening process while maintaining safety compliance and minimizing operational disruption. Whereas most solutions either require custom coding or the involvement of the manufacturer, Mission Control provides an intuitive configuration interface that lets administrators create a tailored questionnaire to guide personnel performing the screening and automatically identify the need for additional verification. Connected security systems “This is a great example of the unique value offered by Mission Control,” said Gabriel Labrecque, Mission Control Product Manager at Genetec. “Where traditional decision management systems are slow to adapt and hard to use, customers are able to tap into the capabilities of Mission Control to rapidly address an emerging challenge. This is done by simply using out-of-the-box Mission Control features and tapping into data from their existing security systems.” Key features of Mission Control for screening applications include: Centralized data: Mission Control leverages data from connected security systems to streamline screening, eliminating the need to extract and record data in multiple locations. Guided operating procedures: The system automatically identifies individuals requiring secondary screening based on questionnaire responses, instead of relying on personnel following offline procedures. Automation: When employees are delayed by secondary screening or sent back home to self-isolate, data is automatically tracked, and managers and employees can receive a copy of the screening questionnaire. Dashboards: Using Security Center dashboards, customers can keep track of the latest screening metrics to measure efficiency, track trends, and assess resource allocation, as well as the impact of screening on an organization. centralized data collection Mission Control offers an intuitive design and administration interface. Procedures can be created and customized in a few clicks, so that screening staff can easily keep up with changes to guidelines. Its centralized data collection provides real-time data from each screening station.
March 2020 saw the beginning of worldwide lockdown measures that forced the majority of businesses worldwide to work remotely in response to COVID-19. Organizations quickly pivoted their operations from office environments to work-from-home (WFH) models, significantly impacting productivity, performance, and security. These are among the findings of the ‘2020 Work-from-Home IT Impact Study,’ commissioned by Sectigo and conducted by independent research firm Wakefield Research, which polled 500 IT professionals at companies with at least 1,000 employees in the UK, U.S., Canada, Germany, France, and Ireland, to understand the impact of the worldwide crisis on large businesses. Fully remote work environment Transforming to a fully remote work environment required quick updates to technology, processes, and procedures, resulting in repercussions to revenue and cybersecurity. Surprisingly, the survey revealed that despite the need to adapt to a rapidly changing work environment, IT professionals report that their organizations saw performance improvements. Almost half of UK respondents (49%) report that employee productivity at their company has increased In fact, almost half of UK respondents (49%) report that employee productivity at their company has increased as a result of WFH measures. “As C-Level executives continue to embrace the increased productivity of a distributed workforce, they need to consider new approaches to security that rely on automation and secure digital identities,” said Sectigo CEO Bill Holtz. Enabling remote workers “The reality is that the enterprise currently uses a mix of authentication tools that frequently includes outdated or weak methods. This research indicates that with many employees remaining at home for the foreseeable future or even permanently, refining how we grant and manage digital access is more important than ever.” While increased productivity may be one positive outcome, it certainly isn’t an immediate reality for many, as survey responses indicate that enabling remote workers came at the expense of more than just effort and time. Nearly 40% of those surveyed overall—36% in the UK—said that their organizations had to delay revenue-generating initiatives for a month or more to prioritize the setup and success of remote work and ensure their businesses were fully operational with little-to-no downtime. Postponing cybersecurity initiatives While investing in WFH infrastructure was critical for business continuity, project delays have a potential long-term impact across the enterprise. Many IT professionals indicate that establishing WFH infrastructure compromised other important work in their departments. 45% of UK respondents said that they had to postpone cybersecurity initiatives for one month or longer Similar to the number of those reporting that IT projects were forced to freeze, 45% of UK respondents said that they had to postpone cybersecurity initiatives for one month or longer as they focused on remote work setup. IT professionals feel that they and their co-workers have stepped up their performance despite the challenges of transitioning to WFH. More than half (53%) of UK IT professionals feel employee productivity has increased since the start of widespread remote work, while only 12% feel it has decreased. Lasting impact from the pandemic This confidence in productivity is especially high among IT professionals in executive positions. The study found that across regions, C-Level IT pros (63%) are more likely than mid-level (40%) and non-management (41%) IT pros to feel that overall productivity has increased. Since productivity is directly linked to increased revenue, this perception bodes well as enterprises move beyond the lockdown and jumpstart projects that have been stalled. Not surprisingly, with productivity sustaining or increasing, 65% of UK respondents think that the number of remote workers at their company will increase somewhat (49%) or increase significantly (16%), compared to the pre-COVID-19 level, indicating a lasting impact from the pandemic. Traditional cybersecurity threats While Zoom-bombing might have made headlines, only 33% of UK respondents expressed concern about that risk, while many more UK IT professionals worry about traditional cybersecurity threats. Phishing or other malicious emails (47%) and insecure Wi-Fi (48%) pose a higher perceived risk to remote work environments, outweighing concerns around Zoom-bombing, as well as unknown personal computers and BYOD devices (27%). When it comes to securing networks, UK respondents use various measures When it comes to securing networks, applications, and other systems from unauthorized access, UK respondents use various measures, including several with known vulnerabilities. An unfortunate fact is that strong and proven authentication technologies, such as user identity certificates (58%) and biometrics (26%), frequently take a back seat to methods with widely known weaknesses, including traditional username and password (74%) and hardware-token multi-factor authentication (68%). Improving security and business continuity Although security breaches doubled in 2019 and the broad use of traditional security measures have proven to be vulnerable, two-thirds of UK respondents believe that their companies are investing ‘the right amount’ on cybersecurity right now. However, 95% of UK respondents are likely to undertake additional measures to improve security and business continuity in the next 12 months due to widespread remote work—with 52% indicating that they would increase security for data and applications, compared to the pre-COVID-19 level, once offices are reopened. The 2020 Work-from-Home IT Impact Study was conducted by Wakefield Research between May 15th and May 26th, 2020, among 500 IT professionals at companies across industries with at least 1,000 employees in the U.S., Canada, Germany, France, Ireland, and UK. The margin of error for the results is +/- 4.4 percentage points.
Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of its Workforce Identity Solutions in AWS Marketplace. These cloud-ready solutions enable enterprises to secure remote work and boost employee productivity by providing the ability to easily extend access across Software-as-a-Service (SaaS), legacy applications, cloud applications and more for seamless login experiences. With AWS Marketplace availability, Amazon Web Services (AWS) enterprise customers can now quickly procure and deploy all of Ping’s Workforce Identity Solutions to empower employees to work virtually from anywhere, while providing a centralized authentication service to access their AWS infrastructure. Access management solutions Ping’s Intelligent IdentityTM platform helps improve workforce productivity, security and agility while enhancing access security to enterprise apps, APIs and data. Ping’s robust Workforce Identity Solutions empower enterprises with on-premises and hybrid IT environments to efficiently and securely migrate to the cloud while streamlining the user experience. “AWS Marketplace streamlines the selection and procurement process for identity and access management solutions on AWS,” said Chris Grusz, General manager, AWS Marketplace, Amazon Web Services, Inc. “We are delighted to welcome Ping’s Intelligent Identity Platform to AWS Marketplace to help enterprises quickly implement their security posture without sacrificing the user experience.” Fast purchase experience At GSK, the user experience is king, but at the same time, that experience has to be secure" "At GSK, the user experience is king, but at the same time, that experience has to be secure. With Ping, we've increased security. while making users happier," says GlaxoSmithKline's Brian Lewis, IAM Solutions Architect. Ping’s Global Partner Network can also resell Ping Identity via the AWS Marketplace Consulting Partner Private Offers programme (CPPO), which allows AWS customers to procure Ping’s solutions from an AWS Partner Network (APN) Consulting Partner who has knowledge of their business and receive the same fast and friction-free purchase experience they’re accustomed to in AWS Marketplace. Strengthen security of remote work “Ping Identity is committed to working with AWS and our global partner network to enable today’s enterprises to enhance security of their AWS environments,” said Loren Russon, Vice President, Technology Alliances, Ping Identity. “Expanding our AWS Marketplace listings to include all of our Workforce Identity Solutions and giving our partners the ability to resell Ping via AWS Marketplace Private Offers are more important milestones in helping our global customers boost employee productivity, strengthen security of remote work, and increase business agility.”
Sectigo, a provider of automated digital identity management and web security solutions, announced a video series on Sectigo’s YouTube Channel. The IoT video series offers security engineers, developers, product managers, and anyone using or developing connected components and devices valuable guidance, ranging from fundamental to advanced level, for securing IoT devices. Hosted by Alan Grau, Sectigo VP of IoT/Embedded Solutions, the initial “explainer” videos in the series include: IoT Security Challenges The first in the series, the IoT Security Challenges video encompasses a wide range of fundamental security topics including embedded security, secure boot, embedded firewall, secure firmware updates, secure key storage, IoT device identity, and PKI for IoT. Alan Grau addresses several specific issues, including: Common vulnerabilities found in IoT devices What security actually means for IoT devices, and which solutions actually work Which types of IoT security solutions actually work, and why Security claims vs. security realities for IoT devices Challenges of building security into IoT devices Secure Boot for IoT Devices The Secure Boot for IoT video covers IoT security, embedded security, secure Boot, and secure firmware updates. Grau provides both an overview and a deep dive into Secure Boot and how the functionality can greatly help secure IoT devices by ensuring that they are always running unmodified code from the OEM. He also discusses the various ways that hackers attack embedded devices, Root of Trust, code signing, and code validation. Embedded Firewall for IoT Devices In the video about Embedded Firewalls, Grau covers what embedded firewalls are and how they are different from other network and endpoint firewalls. He discusses the challenges of building security into IoT devices, why embedded firewalls are important (and essential features), as well as embedded use cases for automobile (ADAS) and aircraft control systems.
March Networks®, a video surveillance and video-based business intelligence provider, is pleased to announce a new solution to help enterprise businesses manage new health and safety compliance regulations in the COVID-19 era. The company’s Health Compliance Solution delivers a suite of new features to help banks, retailers, restaurants, schools and other businesses monitor and measure occupancy in real time, rapidly detect individuals who may pose a potential risk, and ensure compliance with new cleaning and sanitization procedures. Data analytic platform The solution, based on March Networks’ highly flexible data analytic platform called Searchlight, combines data from video surveillance cameras and third-party sensors to alert operators in real time of potential compliance violations. The solution was recently selected for rollout by a major European supermarket chain with more than 150 locations. The first release of the Health Compliance Solution includes: Real-Time Occupancy Management – Using Searchlight, businesses can count the number of people entering their locations in real time and visualize occupancy data in multiple ways, both locally and from a central location. Occupancy alerts can be displayed on a local, color-coded video client or public view monitor, a mobile phone or tablet or via a smart lighting system, which can change color to indicate when a business is nearing or has reached its maximum capacity. Thermal imaging cameras All visual indicators of occupancy are easy to setup, custom configurable and displayed in real time Once capacity has been reached, video clients display the maximum count number with a red background and Searchlight simultaneously sends an email or SMS message to a manager so they can react in real time to close their doors. For large enterprise businesses, color-coded occupancy data from multiple sites can be viewed together from one central location, along with associated surveillance video. All visual indicators of occupancy are easy to setup, custom configurable and displayed in real time. Data can also be viewed historically via Searchlight’s reports and dashboards, allowing managers to identify trends and more easily pinpoint high-risk locations. Real-Time Alerts on Elevated Body Temperatures – COVID-19 has generated immense interest in thermal imaging cameras as a tool to identify individuals with elevated body temperatures. Searchlight’s open platform integrates with many of the third-party thermal cameras to send real-time email and SMS alerts when an alert is triggered. Email notifications include a video snapshot of the person that triggered the alert, so managers can quickly identify the individual and take appropriate action. Potential risk factor Searchlight logs all alerts centrally so managers can search and sort alerts by location and camera, view data in chart or graph format, identify trends and rapidly respond to locations presenting a potential risk factor for virus transmission. Audits can also validate that employees are wearing masks and gloves Health & Safety Audits – Leveraging Searchlight’s convenient Security and Operations Audit features, businesses can automatically capture video of new health and safety procedures to ensure compliance with re-opening rules. Examples include a video database of employees washing their hands at prescribed intervals, and regularly cleaning high-touch surfaces. Audits can also validate that employees are wearing masks and gloves and that physical barriers like sneeze guards are in place. Improving health and safety “COVID-19 has created unprecedented challenges, and at March Networks we’re doing all we can to help business owners get back to work while instilling confidence in consumers that these organizations have taken the necessary steps to keep them safe,” said Peter Strom, President & CEO, March Networks. “With Searchlight as the centerpiece, this solution equips businesses to quickly make informed decisions that can help them reduce risk and further improve health and safety moving forward. We will continue to work closely with our customers to add more functionality to the platform as new regulations emerge.” The March Networks Health Compliance Solution is available starting this month on flexible one, three or five-year service terms. In Canada and the U.S., the solution will also be available as a hosted service, offering convenient monthly invoicing options.
VXG is announcing full integration of any camera with any AI engine. The company was originally founded in 2016, with headquarters in Toronto, Canada, by experts in Video Management Software (VMS) and Video Artificial Intelligence (AI), and was created with over 20 years of experience in the video surveillance industry, with the idea to make video AI solutions highly scalable and more affordable. VXG is an open AI Video Surveillance as a Service (VSaaS) VMS company that offers a platform connecting any camera to any AI, at any scale. VXG provides cloud and on-premise software, and connects cameras to leading AI solutions including Amazon Rekognition, Azure Cognitive Services, Google Vision AI, and OpenVINO, as well as any proprietary vision AI. Delivering unlimited scalability, massive cost reductions, and extensive bandwidth saving. Video management platform What makes VXG different is its AI management - connecting any camera through the platform to any AI Similar to other VSaaS/VMS vendors, VXG offers a complete video management platform with functions like camera management, multi-format video streaming, and cloud or on-premise video recording. VXG offers white label web and cellphone front-ends, and SDKs for fast integration with existing or new services. What makes VXG different is its AI management - connecting any camera through the platform to any AI. VXG pre-processes video for AI and whether this is extracting images or short clips, VXG does it at any scale. Then VXG interfaces data with video AI solutions from companies like Amazon, Microsoft, Google, and Intel, and provides a wide variety of AI use cases from people counting and scene recognition, to facial analysis and face recognition. Optimal employee-to-customer ratio Analysis of images provides actionable information critical to business people and decision makers, some examples include: Traditional Video Analytics People Counting - How many people are occupying a pre-defined space? People/Object Detection - Has a person or object been identified? Car Counting - How many cars are visible in a pre-defined area? Occupancy Rate - How much space is occupied? Are we abiding by government laws/restrictions for occupancy limits? Facial Recognition - Has a face been identified or verified from an image or video frame? Facial Analysis - What features and expressions have been identified on a human face? (age, gender, emotions, etc.) Use Cases and Analysis Retail - Are there enough staff to accommodate customer demand in a given space? What is the optimal employee-to-customer ratio? When are the company’s peak times? Parking - How many parking spaces are available? Tied in with auditing, ticketing and POS data/systems. Real Estate - How many people are in the lobby, or elevator at a specific time? Restaurants - Are there any tables available? Are they abiding by the mandated occupancy restrictions for the restaurant? Transportation - Is each bus, subway car, train abiding by occupancy limits? Are riders distanced properly? Smart City - Is the park, building, hospital, etc. at its capacity? How many people are in a given area? Does anyone have a harmful object on them? Industry Specific - How many dogs/wildlife are there in the park at a specified time? How many cars are on the road right now? Is the supply chain or factory solutions optimized? Video surveillance companies Yaro Lisitsyn, Co-Founder & CEO, believes the company is applying deep learning in a game-changing way for business operations and business intelligence, directly applicable to an abundance of industries and use cases. Yaro says, “We are taking any manufactured camera, and any camera type, and connecting these to the most reputable, leading AI engines. Leveraging these as operational tools to provide real-time, actionable data that is meaningful to key business decision makers.” VXG’s solutions are available globally, working with video surveillance companies, camera manufacturers, retailers, retail analytics companies, and video AI companies helping make AI solutions highly scalable and more affordable.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
The new Student Center at Columbia College Chicago, located at 754 South Wabash Avenue in Chicago, opened its doors in the fall of 2019. This brand-new building offers five spectacular stories of spaces for students including music and film-screening rooms, dining options, a fitness center, a reflection room for meditation and prayer, and event spaces for meetings, performances, and receptions. According to Andy Dutil, Director of the Columbia College Chicago Student Center, the school has taken the initiative to improve overall security, with the intention of keeping an open feel to the campus. Speedlane open turnstiles To help meet that objective at the new Center, the architects designed the building with Speedlane Open turnstiles and a TQM manual revolving door from Boon Edam. Columbia College Chicago has a closed campus. In order to enter any building on campus students and staff must have a Columbia ID or visitors must have a valid appointment. The main entrance at the Student Center is the TQM revolving door that leads to a public foyer that includes a coffee shop and lounge. Guards watch as people pass through them to ensure that everyone is scanning their IDs Since the turnstiles are just past the security desk at the boundary of this area, they serve as a visual and physical indicator of where the public area terminates. Next to the Speedlane Open turnstiles, which are notable because they do not have any closing barriers, guards watch as people pass through them to ensure that everyone is scanning their IDs and that the IDs are valid, in which case the turnstile shows a green light. Controlling access without being obtrusive In a situation where a red light shows and the turnstile alarms, the guard will check the person’s credentials and can try to troubleshoot the ID card. “The decision was really about what creates the least barrier to those entering and exiting the building,” said Dutil. “We don't really want our students to feel like they are overly policed or that our buildings are not accessible to them. So the design of the Open turnstiles provided the best solution in terms of controlling access without being obtrusive.” Before the Student Center was built, students entering any campus building would just show their ID to the security officer as they walked past. The administration realized that while this does provide some level of security, it is not foolproof – particularly when many people are entering at the same time for a class. Brief learning curve The College’s head of security made the suggestion to install a system that would allow for swift passage of authorized people while maintaining accountability around who enters and exits the building. As anticipated, there was a brief learning curve for the students using the new system As anticipated, there was a brief learning curve for the students using the new system. “This was the first system like this on our campus,” said Dutil. “And the first few days that the new Center was open were also the first few days of school. There were a lot of people new to the campus who required a bit of coaching from guards and our student staff in terms of where to place your card, and to not walk through before you place your card.” Dutil confirms that the access systems placed at Boon Edam turnstiles are actually outperforming those placed at swing doors across the campus for convenience and adoption. Benefits beyond campus security “Across the campus, there is a card reader at every swing door entrance of a building where you present your card and a light turns red or green. But oftentimes the card reader is missed, or depending on the placement of the lights and placement of the guard, it can be kind of hit or miss with students walking right by it.” “But with the Open turnstiles, they're very visible and although they're not a total barrier to entry, they are something that's right in front of you. Because it's very noticeable and not easily overlooked, the students have learned pretty quickly to get their ID out. In fact, this was meant to be a test run for the campus to ensure it would be viable and worthwhile for other buildings as well.” The turnstiles have delivered additional benefits beyond basic campus security, according to Dutil. Convenient touch panel “One of the nice things about a system like this is that we can count visitors to the Student Center because we get the data of everybody that scans in. So on a busy day for us it's about 2500 people throughout the day. That can range depending on what's going on and what time of year it is. On weekends we're very slow, since there are no classes – maybe 900 to 1200.” There's a really convenient touch panel right at the security desk called the BoonTouch" “We are a rental venue as well, so we have times where the building is open to non-Columbia College Chicago people for events or other functions. There's a really convenient touch panel right at the security desk called the BoonTouch, where the officer can turn off the turnstiles during those times and then attendees can move through freely without any alarms going off at all.” Keeping the building warm Finally, the TQM revolving door delivers one additional benefit to the Student Center, located in a city known for harsh weather. “Revolving doors are always preferred at a building like this that gets a lot of traffic going in and out. We have cold, drafty weather that blows right into our main space at that first floor entry. The revolving door helps to keep the building warm and saves energy and utility costs as well,” said Dutil. “Students feel safe and comfortable entering the building at night,” he concludes. “Our building has a lot of nooks and crannies, and someone can end up alone in a space. And so I think knowing that the only people that are in that building are the ones that are supposed to be there is helpful. Overall, our students appreciate the effort to try to keep them safer.”
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enroll and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
As one starts to adapt to the ‘new normal’ it has been announced that schools in Wales will reopen from June 29th with a phased return. With this in mind, Oprema has donated an Olix OBTM-FS1, Intelligent Free Standing BTM Terminal to Greenhill School in Cardiff. Greenhill School helps young people to thrive in a caring and supportive community while ensuring that children are equipped with the skills required to help them achieve to the best of their abilities. Their vision and purpose means that every child has a right to educational excellence through high quality teaching. Non-Contact temperature measurement As the school prepares to reopen its doors Oprema wanted to ensure that the children returning remain as safe as possible, along with the hard-working staff that work there. The Olix OBTM-FS1 takes a non-contact temperature measurement on the wrist and is accurate to +/- 0.3°C. The person’s temperature reading is displayed on an LCD screen. If the unit detects a raised temperature the alarm will sound to notify the user. The unit has been placed in the reception area of the school so that all students, staff members and visitors can be temperature checked before entering the building. High temperature is one of the key symptoms associated with the Coronavirus. Temperature monitoring system If a high temperature is identified, then government guidelines for testing and self-isolating must be followed. The Olix OBTM-FS1 helps minimize the risk of spreading the virus and the non-contact technology allows for no personal contact with potentially infected individuals. Shane Mock, Headteacher of Greenhill School has said “This temperature monitoring system will be a great help in ensuring all at the school are well and kept safe during this pandemic. It’s an impressive piece of technology which will give us further confidence in ensuring the health and safety of all members of the Greenhill community. We want to thank Oprema for their kind donation and generosity.” Oprema are delighted to have been able to assist the school in being able to open their doors once again in a safe way.
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cybersecurity. Rolling stock manufacturers We have been able to fulfill Stadler’s requirements for high-quality delivery of passenger information" “Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey." "We are pleased that we have been able to fulfill Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste. Effective transport system Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day. Customers can visit the company’s website for more information about the solution and its benefits.
3xLOGIC, Inc., a globally renowned provider of integrated, intelligent security solutions, has announced that Harvest Health & Recreation Inc. (“Harvest”) continues to roll out 3xLOGIC infinias access control to its fast-growing number of locations across the United States. Dem360, LLC has been an integral partner for this project, providing their managed IT, network engineering, and security system design expertise. Multi-state cannabis operator Headquartered in Tempe, Arizona, USA, Harvest Health & Recreation Inc. is a multi-state cannabis operator (MSO) and vertically integrated cannabis company. Subject to completion of announced acquisitions, Harvest will have one of the largest footprints in the US. Since 2011, the company has been committed to expanding its Harvest House of Cannabis retail and wholesale presence throughout the U.S., acquiring, creating, and growing brands for patients and consumers nationally and continuing toward a path of profitable growth. Enterprise access control solution Harvest is pioneering this industry and looking to scale into an enterprise environment" “We want to be able to control who goes where, regardless of the facility,” explained T.J. Buskirk, National Security Director for Harvest Health & Recreation. He adds, “For example, why might an employee be in an area they shouldn’t? Our access control allows us to track who, when, and where. I like the fact that the system grants access to someone for a particular door, and then after hours, that access is shut down—that level of control.” Gary House is an IT Architect with Dem360, who has been on the project working closely with Harvest since the beginning. “Harvest is pioneering this industry and looking to scale into an enterprise environment. Harvest has been studying and standardizing on various technologies. I did my own research of access control systems, and I love the infinias IDC controllers.” 3xLOGIC infinias access control Harvest has standardized on 3xLOGIC infinias access control and has separate video surveillance and alarm systems. Buskirk said, “In this business, we have to be sensitive to all the different state rules and regulations. I’ve got to have system interoperability from state to state, as well as personnel trackability and clear audit trails for the regulators.” Upgrade to infinias Corporate Edition To date, Dem360 has installed infinias access control in 30 facilities, controlling over 400 doors. The next big milestones in this system rollout is to convert all current facilities to the infinias Corporate Edition, install Corporate going forward, and migrate all managed doors to a scalable data center with a single database built on redundant, fault-tolerant architecture. Harvest has also adopted the badge making feature within the infinias platform to print and manage company ID cards. Security Operations Center With a growth trajectory like Harvest’s, reliability and scalability are considered as key With a growth trajectory like Harvest’s, reliability and scalability are considered as key. Eventually, Harvest’s Security Operations Center will have full visibility across every facility 24/7 throughout the year. “We have a great working relationship with Gary and Dem360, and that makes everybody’s job a lot easier,” said Buskirk. Efficient access management system He adds, “We have an incredible magnitude of the different directions we can go with this business. However, at the end of the day, we have to design our access management for our employees, patients, and customers. Whatever the facility and the need, we must ensure highly productive workflows, while staying firmly within each state’s guidelines.” He further said, “Infinias gives us what we need without impediments. We’ve never had to ‘fork lift’ anything. This system adapts and it gives us flexibility and scalability, we have one door at this facility and hundreds of doors at another.” Flexible, scalable access control Buskirk said, “From the beginning, the infinias access control system has been able to react to the Harvest environment of change and fast-paced growth. We can manage access for different groups in completely different ways, and I love that I can turn off a badge at a moment’s notice.” He concludes, “The infinias system is very user-friendly, that was one of our key demands. It’s meeting all our needs, and we are able to manage our facilities remotely. Its robust features and benefits meet the varying demands of the dynamic, high-growth Harvest environment and our vision for the future.”
ID R&D, the award-winning biometric solutions provider offering AI-based voice, face and behavioral user authentication and anti-spoofing capabilities, announced that its ISO 30107-3 compliant passive facial liveness product, IDLive Face has been selected by Reconnect, a Public Benefit Company that is revolutionizing the criminal justice industry. The technology further facilitates Reconnect’s mission to deliver modern monitoring technology that is designed to reduce incarceration, recidivism, and addiction. Reconnect is transforming outdated court-ordered monitoring that utilizes phone-based systems and bulky unreliable ankle bracelets to track location, mandated treatment attendance, and curfew. Criminal justice system Reconnect replaces these systems, which restrict movement and make re-entry to society more challenging, with a cellphone app and discreet ankle monitor. The solution is easier to use and maintain, more humane, and significantly less expensive which removes a huge burden for defendants who often can’t afford the equipment leasing fees. On any given day, more than 155,000 people in the criminal justice system are under some form of electronic monitoring and with new initiatives to reduce inmate populations to curtail the spread of COVID-19 that number will rise. Reconnect enables supervised persons to check in with a selfie on a cellphone app that uses GPS technology, face recognition for biometric matching, and ID R&D’s passive facial liveness to quickly and frictionlessly verify the user’s identity and location. Active facial liveness solution Prior to selecting ID R&D, Reconnect was using an in-house developed active facial liveness solution The liveness check, which happens nearly instantly in the background, ensures the user is present and not spoofing the system with a photo or video. Prior to selecting ID R&D, Reconnect was using an in-house developed active facial liveness solution that required users to follow instructions including blinking. “Liveness is a critical part of the Reconnect solution, but it’s not a core competency for us. ID R&D’s best-in-class technology enabled us to improve accuracy and reduce fraud while eliminating the need for active participation by users, resulting in a faster experience and less confusion,” said Melih Onvural, VP Product at Reconnect. Frictionless user experience Reconnect is used by over 150 drug courts, probation, parole, and third party administrators across 31 states. The solution provides all the capabilities of traditional monitoring mechanisms without the cost, usability issues, or stigma and with features such as reminders designed to help people succeed and reduce recidivism. It also provides a single platform for the court to monitor their entire population of supervised participants. “We applaud Reconnect’s mission to deliver a more ethical and effective form of monitoring while allowing courts to manage participants with less manpower at a lower cost,” said John Amein, SVP of Sales at ID R&D. “This is an excellent example of ID R&D’s commitment to using the science of biometrics to deliver the ideal, frictionless user experience for authentication while also strengthening security.”
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload