Suprema, a pioneer in access control, biometrics, and time & attendance solutions, announces that it has integrated its latest facial recognition devices into Nedap's access control system, AEOS. This will enable organizations around the world to manage access control by making use of Suprema’s latest facial recognition technology. “The COVID-19 pandemic has shaken up the security and building management industry, resulting in a surge of interest in contactless access control. T...
The return to the workplace is a focal point for many in the built environment but one of the most important elements is easy to overlook. Guest services will be vital in the return to the workplace. Front-of-house teams will be responsible for welcoming building users back and reassuring them as they negotiate shared spaces in the post-Covid era. The workplace will inevitably look different after Covid. We have become more aware of our spaces, how clean they are, and what spaces building users...
Allegion, the globally renowned provider of security products and solutions, including Schlage readers and locks, together with CBORD, a renowned higher education technology solutions provider, announced that they have expanded their offerings and now provide on-campus mobile credential solutions on Android phones. Students, faculty and staff on participating campuses can now use their Android phones to conveniently, safely and securely access campus buildings and make purchases through Google...
Zenitel, the supplier of intelligent and interoperable communication solutions, announces the release of its Cybersecurity Hardening Guide. The Zenitel Cybersecurity Hardening Guide follows controls outlined by the Center for Internet Security (CIS) SecureSuite, of which Zenitel has been a member for many years. CIS harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. Its CIS Controls Version 7.1 and CIS Benchmarks are the global st...
The pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security, according to a new survey from Ping Identity, the Intelligent Identity solution for the enterprise. The Ping Identity executive survey: growth in remote work fuels zero trust investment asked more than 1,300 senior executives across the U.S., U.K., Germany, France, and Australia about how the pandemic has impacted their IT resourc...
Allegion Ventures, a US$ 50 million corporate venture fund of Allegion plc, has expanded its strategic portfolio with an investment in Mint House, a startup that’s revolutionizing the hotel experience for modern business travelers through technology-aided amenities, such as secure mobile check-in and keyless entry, digital concierge services, customized pre-stocked grocery delivery and more. Terms of the transaction were not disclosed in the release. Strategic investment portfolio In lat...
ID solutions provider and card manufacturer, Databac celebrated its 50th anniversary with a brand new look and revamped website. The company, founded in 1970, has grown from a local business offering laminated cards to an international organization with a wealth of experience in all aspects of identification technologies. New logo and website To mark the milestone, Databac has developed a new logo and created a new website, which better reflect the company as it is today a dynamic, experienced, and global player in the security industry. Databac’s growth has followed the evolution of the security market for half a century" “Databac’s growth has followed the evolution of the security market for half a century. The industry has little in common with the days of punch-hole Hollerith cards, which we made during our early days,” commented Databac’s Chief Executive Officer (CEO), Charles Balcomb. Charles Balcomb adds, “The world today is much more connected, with sophisticated solutions that are highly secure, personalizable and multi-functional. Our new look represents who we are now - a specialist partner for our clients, empowering them to manage their security needs through our identification solutions, with an emphasis on sustainability.” Anti-microbial card holders and touch-free biometrics The anniversary coincided with an unprecedented situation provoked by the COVID-19 global pandemic. To help manage the situation, Databac has incorporated new hygiene and safety solutions into its portfolio, ranging from anti-microbial card holders to touch-free biometrics with mask detection. Databac’s evolution builds on its ability to adapt to a changing world. This agility is reflected in the dual business model of its own manufacture with sourcing from qualified partners. UK and Spain manufacturing facilities The factory in Surrey, United Kingdom, produces bespoke, multi-functional cards, while the facility in Barcelona, Spain, has a bureau dedicated to card personalization and encoding. These operations are complemented by identification systems, printers, readers, software, and accessories from its global network of strategic partners.
iPhone users have a new way to keep their data and information safe from hackers with XSealed, an app that creates a maximum-security room to securely house private data and activity. XSealed iOS app The newly launched XSealed iOS app is available now in the AppStore and allows users to manage passwords, browse privately, and store their private pictures, files, and other information in an encrypted room, which hackers cannot decipher, even if the phone is compromised by an intruder. According to Pew Research, 64% of Americans have experienced a major data breach of some sort and when it comes to smartphones, devices can be compromised by phishing attempts, public Wi-Fi, poor password management, malware, and other common hacking attempts. Enhancing personal data security When a user downloads the XSealed app and sets up a private room, they can securely browse the internet The XSealed app ensures that user data is protected, even if a phone is accessed physically by someone who obtains the password or by online hacking. When a user downloads the XSealed app and sets up a private room, they can securely and privately browse the internet, without their activity being accessible to outsiders. They are able to access a secure password manager and they can safely store their most private pictures and videos, as well as their banking information, contacts, and anything else that they want to keep private. Secure cloud backup and restoration With XSealed, users get maximum security through configurable locks, encryption, lockout attempts protection to stop hackers, lock and key protection to keep keys private, account recovery for lost or forgotten keys, and quick wipe to erase the vault contents. Additionally, XSealed provides a secure cloud backup and restoration feature to recover lost data. Another feature available with XSealed is a secure password manager, which enables the user to load their favorite sites, long passwords and usernames, and assign an icon of choice for each. Once the password item is created, a user only needs to click the assigned icon and they are automatically logged on to the corresponding site, allowing for quick access to frequently visited websites. “With XSealed, iPhone users now have the most secure way to keep private information private, whether from a snooping intruder or an online attempt to access the phone by hackers,” said the XSealed development team. Configurable locks With the XSealed app, lockout attempts have security features to protect against hackers Configurable locks for the app work by giving the user a choice of up to 3 lock options for their private room, including biometric, pattern, and password unlock. With the XSealed app, lockout attempts have security features to protect against hackers trying to access the phone, yet the app still enables account recovery for genuine lockouts, if in the case keys are forgotten. Lock and key protection Lock and key protection with XSealed works by creating unique keys after setup is completed. Unlike passwords, keys are not saved anywhere on the device. This increases security in the event of a hack as keys are matched to the locks by hashing, an algorithmic method that creates the keys at the time of each successful unlock. Once inside the XSealed vault, users can access a main control panel with sections that organize their private activity or storage. Everything in the vault is encrypted and secure unless exported outside of the app. Free and paid subscription options Anyone interested in trying the XSealed app can do so for free by downloading the app in the AppStore. The free version includes limited entries, while the paid monthly subscription option for XSealed allows unlimited entries to be made in the private room.
SATO, a global front-runner in the development of auto-ID and labeling solutions, has partnered with global data storage systems provider Hitachi Vantara to deliver best-in-class equipment, configuration, installation, and support at its state-of-the-art European Distribution Center (‘EDC’) in Zaltbommel, The Netherlands. The EDC, which was unveiled in 2013 as the first building of its kind to limit the use of natural resources, is used by more than 100 Hitachi Vantara employees and provides 24/7 IT support to its EMEA customers. To continue providing excellent support, the company required a flexible, reliable, and centralized auto-ID solution that could integrate with its current ERP system. SATO printers for a user-friendly experience “From the first moment we sat down with SATO, there was an immediate click and trust was established,” said Robin Stappershoef, IT Service Manager at Hitachi Vantara. “Within a short time, SATO had offered several demo printers that we could extensively test on the shop floor. Barcode terminals were configured onsite by the SATO team, so that they were compatible with our IT system, and support was available when needed with swift action taken.” Prior to meeting with SATO, Hitachi Vantara were using outdated and complex hardware to run its label printing operations. With year-on-year expansion expected, the Hitachi Ltd wholly-owned subsidiary chose the SATO CLNX label printer to deliver a faster and more user-friendly experience for existing and new employees. Flexible service provider SATO thinks alongside and supports Hitachi Vantara in all the countries they operate Stappershoef added: “Within our organization, we use many different labels. Linear barcodes, QR codes and micro 2D barcodes all present challenges in printing and scanning. Both the CL4NX and CL6NX are our preferred printers and we are very satisfied with their performance. For instance, we now have faster label roll changeover, can easily replace any wear and tear on parts such as the print head and pressure rollers, and features superb integration with our Oracle ERP system.” “With SATO, we really feel like we have a partner who thinks alongside us. As a flexible service provider, it’s important for us to partner with suppliers who can support Hitachi Vantara in all the countries in which we operate. As such, we know we have found the right partner in SATO.” Successful partnership The successful partnership with SATO has enabled Hitachi Vantara to deliver worldwide uniformity to its customers. The company hopes to roll out the CLNX equipment in all branches worldwide following the installation at the EDC in Zaltbommel. Valentijn Gerritse, Account Manager at SATO, commented: “We are excited to partner with Hitachi Vantara and support its EMEA team with our next-generation auto-ID solutions. Our CLNX printers are very reliable and some parts, like printhead and platen roller, can be easily replaced by our customers without any tools. The CL4NX and CL6NX is an excellent choice for Hitachi, improving its labeling productivity capabilities and reducing long-term costs.”
Safeture has entered into an agreement with the U.S./EU corporation Insured Nomads, the first insurtech company focused on remote workers, digital nomads, expats, and travelers. As of now, Insured Nomads, with the help of Safeture's technology, can offer and extend policyholders with an upgrade of benefits and services suited to the needs of the new normal. Initially, the agreement runs for three years and gives Safeture 500 000+ USD plus additional revenue with membership growth. Remote work lifestyle Although working remotely was initially viewed as a perk, a recent survey of HR, legal and compliance, finance, and real estate professionals found that 47% of respondents will allow remote work on a full-time basis. This increase creates a demand for new and better solutions that guarantee that employees are safe and protected regardless of their workplace. Insured Nomads is at the forefront of addressing these needs and challenges for remote workers, digital nomads, expats, and travellers. "The global and remote work lifestyle has been a growing sector but has been accelerated due to the pandemic. By adding Safeture's technology, we give our policyholders an increased level of security and instant protection while traveling, all within a native app for our Juvo experience," says Allen Koski, President, and Chief Innovation Officer at Insured Nomads. Offering adequate protection The agreement gives Safeture more than 500 000 USD over three years plus revenue per user The collaboration with Insured Nomads begins on April 1, 2021. Initially, the agreement gives Safeture more than 500 000 USD over three years plus revenue per user as membership globally increases. "This is a key order for us. It clarifies the shift in the economy, and it is obvious for attractive employers to offer adequate protection even for the category of employees who rarely set foot in an office - always out of office. I think we will see more of this in the future," says Magnus Hultman, CEO of Safeture. Global location intelligence Our partnership with Insured Nomads signals the true evolution and investment in the remote worker. Identifying their needs and providing the technology to meet them will be the focus of the Safeture and Insured Nomads partnership for the foreseeable future. With Safeture's technology, Insured Nomads can offer policyholders a blended and unique suite of benefits. Including custom technology, insurance, counseling, telemedicine, global location intelligence, SOS/panic button response with boots on the ground, duty of care and more as part of the Juvo branded app experience.
CIE (CIE Security), a global distributor of audio-visual and security brands, is pleased to announce the UK launch of the A05C Access Control Unit from Akuvox (Akuvox Networks). The A05C is the first of Akuvox’s brand new series of smart IP access control readers and features a distinct 5-inch HD color screen that is attractive in design and easy to use. AI and dual-camera Technology The A05C is one of the most advanced IP access control readers available on the market The unit also incorporates the latest deep-learning AI and dual-camera technology, which allows for secure, touch-free verification via face recognition, Bluetooth, RFID or QR Code scanning, all of which are supported by the Akuvox SmartPlus smartphone app. With these features available as standard, the A05C is one of the most advanced IP access control readers available on the market. Furthermore, the A05C access reader is also available with optional thermal detection modules to check anyone entering the building for fever-like body temperatures. Deploying contactless technologies “The COVID-19 (coronavirus) pandemic has changed the world - as we return to work, school, university and other public access environments, there is a large number of high frequency 'touch points' involved in our daily lives that are likely to spread germs and viruses,” commented Chris Edwards, Marketing Director of CIE. Chris adds, “With this in mind, Akuvox have been focusing on adding more products to the range that reduce these touch points during day-to-day activities by using a wide range of contactless technologies and features. The A05C is a prime example of product that Akuvox has produced to meet the demands for the growing architectural trend for COVID-19 secure ‘contactless pathways’ in the workplace.” A05C smart IP access control reader Akuvox is one of the renowned worldwide brands for IP intercoms, access control, and telephony equipment. Established globally, as well as in Europe, its mission is to improve people's lives with better communication, greater security, and more convenience, all through its product offering. The A05C smart IP access control reader comprehensively delivers on this promise. The unit also embraces QR code-based access control for ‘one time’ access for external visitors Featuring face recognition technology integrated into an access control unit, the A05C will automatically compare the visitor’s face with a database of enrolled faces and perform automatic match notification to grant access. The unit also embraces QR code-based access control for ‘one time’ access for external visitors. Typically, residents/building managers can generate a QR code from the Akuvox SmartApp for a visitor to use on their mobile device, which will allow entry to the building (or specific area) on a limited use/fixed time basis. Wide range of authentication methods The A05C complete range of authentication methods for ultimate security and flexibility are: Secure infrared face recognition. QR Code (eg. for one-time access). NFC, RFID, and Bluetooth contactless via smartphone, ID card, or keyfob. Body temperature detection (if paired up with the Akuvox MD02 unit). The A05C Access Control Unit is IP65 rated so can be used for external gate systems and high-impact areas. This advanced access control device also supports ONVIF open standard for effective integration with other third-party IP systems and devices, such as IP CCTV cameras and Network Video Recorders (NVRs).
The Security Industry Association (SIA) has named Kasia Hanson as the new chair of the SIA Women in Security Forum. Hanson – Global Director for IoT partner sales for digital safety and security in multiple areas, including creating safe cities and sports and entertainment, at Intel Corporation – will lead the forum in offering programs, professional development opportunities, and networking events to support the participation of women in the security industry. Global video industry Kasia Hanson is a visionary sales executive with a history of impact in artificial intelligence (AI), the Internet of Things (IoT), data center, cloud, networking, storage solutions, cybersecurity, and software. She joined Intel in 2000, and over the past 20 years, she has delivered solutions globally for the company with multi-billion-dollar customers including Hewlett Packard and Oracle, distribution partners, the security industry, and end-users. In her current role, she drives Intel’s presence and revenue in the global video industry develops and executes partner sales acceleration initiatives, and directs ecosystem development and scale initiatives around AI and IoT, with an emphasis on computer vision and deep learning in the video industry. Several industry initiatives Hanson has served on the SIA Women in Security Forum’s education and outreach subcommittee “I am honored to lead the SIA Women in Security Forum and look forward to applying my experience in technology to the outstanding foundation that has been built over the years,” said Hanson. “Diversity of experience and inclusion of the full community of security professionals is so important, and I look forward to working with SIA to bring more women into the industry to create an amazing and safe future.” Hanson has served on the SIA Women in Security Forum’s education and outreach subcommittee since 2019. She participates in several industry initiatives to advance the use of AI and IoT in cities and sports, including the Innovation Institute for Fan Experience and the National Center for Spectator Sports Safety and Security and served as a board member for Women of the Channel in 2017 and 2018. She also led the Economic Recovery team for Intel’s Pandemic Response Technology Initiative. Inclusive security workforce “SIA’s Women in Security Forum has made remarkable accomplishments over the last three years, and the valuable contributions of the WISF Steering Committee and Forum members like Kasia Hanson have helped make these achievements possible,” said SIA CEO Don Erickson. We applaud Kasia for her leadership and service to SIA and the industry, congratulate her on her new role" “We applaud Kasia for her leadership and service to SIA and the industry, congratulate her on her new role leading the Women in Security Forum, and look forward to partnering with her in promoting the advancement of a diverse and inclusive security workforce.” Founded in 2018, SIA’s Women in Security Forum works to engage all security professionals to promote, recruit and cultivate the leadership of women for a more inclusive and diversified industry. Bringing a diverse perspective The forum’s key efforts and activities include the SIA Progress Award, which celebrates individuals who advance opportunities and pave the way to success for women in the security industry; the SIA Women in Security Forum Scholarship, which furthers educational opportunities and promotes advancement for SIA members and student members; the forum’s Speakers Bureau, which helps SIA members bring a more diverse perspective to the security industry; charitable giving initiatives. Collaborative projects with other organizations that seek to empower women in the security and technology fields; sponsorship of the Women in Biometrics Awards, which recognize distinguished female leaders in the biometric identity and security industry; thought leadership opportunities; and engaging networking and professional growth events. The SIA Women in Security Forum is open to all employees of SIA member companies; learn more and get involved.
If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organizations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points, and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient, and extremely user-friendly. More and more businesses are realizing the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organizations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organizations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centers or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognize individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analyzing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognize. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the center of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasizing barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimization. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle traveling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilize portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
With a mission to recognize the faces of the people entering/exiting premises of the Government Institution in Indonesia, and analyze their attributes in real-time, the authority needed an extremely robust and ‘highly secured’ facial recognition system. Due to heavy footfall at the premise, it was difficult for staff to manually record information of visiting people and verify their identity on a daily basis. Sometimes, they faced challenge in verifying them due to changes in appearance or features of the visitors. Videonetics MeraFace Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation by the partner, as well as government decision-makers. The software was selected for its highest accuracy in recognizing and detecting faces in varied lighting conditions, thereby providing additional attributes of gender, age, and emotions, and comprehensive statistical reporting. Operating 24x7 for 365 days, on one of the busiest premises, with a heavy footfall of VIPs, citizens, media, and government officials, Videonetics MeraFace was deployed at strategic locations with high human traffic flows, including entry and exit points, and lift lobby area of the institution. Key features of Videonetics MeraFace include: Video streams from IP cameras are processed at MeraFace to detect faces in real-time and operators find a probable match with the registered faces. In case, any face that is not registered but has been captured and stored in the system can also be found anytime. Operators have been keeping records of registered faces and attributes of the person’s face for future search and investigation. Powered by AI & Deep Learning framework, MeraFace analyzes and delivers more information, such as gender, age, emotion, eventually helpful for officials to make accurate visitors’ analysis. Now, operators can identify and classify VIP, suspected, blacklisted people in real-time with easy clicks and send the instant notification to the staff, for any swift action. At the time of any suspicious activity, operators can quickly investigate a person’s face in the given videos or collection of face images. Moreover, this feature has been phenomenally successful as an investigation tool, for conducting post-incident analysis. Scalable facial recognition system Videonetics MeraFace has proven to be a reliable and scalable system for the government authority, by delivering fast and highly accurate results. With the system, the security staff can recognize and detect faces in real-time. Furthermore, MeraFace has helped in appointing a smaller number of security guards around the entrance or exit of the premise, thanks to an automated facial recognition system of identifying and validating information. The risk of human errors in face matching has also been eliminated. “Videonetics has not only delivered a perfect facial recognition solution, but also delivered on its reputation of providing outstanding training and support, to us and customer. Our customer has invested in the future-proof technology that has the ability to grow with their needs,” stated Alfred Bisuk, Technical Manager, Lamjaya Inovasi Komputindo.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its ‘Physical Security in EMEA 2021’ report, based on insights from over 1,500 physical security professionals. The report takes a closer look at how physical security teams across Europe, Middle East, and Africa (EMEA) are leveraging technology to manage both short-term needs and long-term priorities. The findings offer useful insights for those responsible for developing their organization’s own infrastructure and security strategies. 2020 has refocused priorities The realities of COVID-19, and the subsequent shift to work at home, have emphasized the value of technology that can provide greater insight and control. As a result, video analytics, access control, and identity management were all identified as strategic technologies for 2021. “Last year we saw a seismic shift in the way companies approach security. The access control boom within facilities showed that the physical security industry is capable of streamlining innovative solutions—particularly when there’s a demand for enhanced safety. As we enter a new chapter, the industry must continue to adapt to changing requirements and invest in the latest enabling solutions to help make our workplaces safer, healthier, and more secure,” said Cyrille Becker, Managing Director of Europe at Genetec. Cybersecurity is a strategic priority Cybercrime is primed to reach record heights in 2021, with the rise of work-from-home and the growing adoption of IoT Cybercrime is primed to reach record heights in 2021, with the rise of work-from-home and the growing adoption of IoT. Against this backdrop, 67% of respondents are planning to prioritize the improvement of their cybersecurity strategy in 2021. “The rise of cybercrime has highlighted cyber and physical security measures can no longer be treated as separate conversations. Physical security professionals must partner with their counterparts in IT to understand the true limits of the security perimeter and mitigate against risk. This requires solidifying a resilient cyber-physical security framework, to ensure trusted devices are integrated into the network and subsequently configured, updated, and managed throughout their operational life,” said Christian Morin, Vice President of Cloud Services and CSO at Genetec, Inc. Accelerating adoption of cloud and hybrid cloud Physical security departments have traditionally been slower to adopt the cloud; however, the survey results indicate the situation is rapidly changing. Almost two-thirds of respondents reporting the pandemic has somewhat (51%) or greatly (12.5%) accelerated their cloud strategy in relation to physical security. “The unprecedented shift to remote work and the resulting need for supporting technology, has highlighted the importance of cloud computing and, if business leaders had not been convinced of its benefits before, they are likely to be now,” added Morin. Survey methodology In January 2021, Genetec EMEA surveyed physical security professionals based in Europe, Middle East, and Africa. Following a review of submissions and data cleansing, 1,550 respondents were included in the sample for analysis.
In 2022 member States of the Schengen Area will be required to have a biometric entry and exit system to register non-European citizens crossing an EU external border. Thales has been selected by the French Ministry of the Interior to deliver several hundred pre-registration kiosks at various border crossing points. Therefore, France will be equipped with a state-of-the-art biometric solution to streamline and secure its air, land, and sea border crossings. Data management protection In accordance with the directive approved by the European Union, the countries that are part of the Schengen Area will deploy pre-registration kiosks or similar equipment in order to allow non-Schengen visitors to register their identity quickly and securely, including their biometric data (fingerprint and facial biometrics). To this end, the ‘Thales Gemalto Border Kiosk’ will provide a self-service, intuitive and interactive terminal to guide travelers through every stage of identity registration and verification. These kiosks, designed and manufactured in Europe, will incorporate various document verification and biometric technologies. They will offer rapid registration for travelers, highly accurate identity verification, data management protection and advanced operational fluidity at border crossings. Smoothest possible experience This new European entry and exit system represents a major challenge for Member States" The verification of biometric data is an extremely effective and reliable technology, allowing Member States to accurately identify any attempted identity fraud and prevent individuals with false documents, multiple identities, etc. from entering the country. “This new European entry and exit system represents a major challenge for Member States. On the one hand, they are required to be ready and compliant with the regulations by 2022; on the other hand, they are faced with the operational reality and the fact that millions of people have to be processed each year, for whom we want to offer the smoothest possible experience. Thales’ expertise in identity and border management provides us with technological reliability, without having to make a choice between security and ease of use,” stated the French Ministry of the Interior. Attempted identity fraud “The pre-registration kiosks manufactured by Thales are equipped with our state-of-the-art technologies for identity creation and verification. They are based on software optimized for ultra-rapid checks of a document’s authenticity and intelligent detection of any attempted identity fraud.” “We have therefore been able to develop high-performance tools to support operations, without compromising the safety and protection of travelers’ data,” said Youzec Kurp - SVP Identity and Biometric Solutions at Thales.
HID Global, an identity solutions company announces that Antigua and Barbuda have deployed HID® Integrale™ for CRVS to modernize the country’s civil registry system. The solution helps the country embark on a digital transformation by enabling the secure registration and reporting of life events of residents and visitors, and offers a single, true source of verifiable identity information. The Government of Antigua and Barbuda (GOAB), the Ministry of Information, Broadcasting, Telecommunications and Information Technology (MIBTIT), the Office of the Attorney General, the Ministry of Legal Affairs, Public Safety and Labour, and local integrator Antigua Computer Technology (ACT) partnered with HID Global to deliver a complete civil registration and vital statistics (CRVS) solution for all life events, such as births and marriages. Digital transformation The solution integrates data from legacy systems, links identities among families for stronger authentication, and features a web portal that triggers procedures for in-person follow-up when additional registration data is needed. The solution was also configured to enable 26 stakeholder organizations, such as the High Court, church councils, and Banking Association, to securely verify identities for a host of use-case applications. “This solution will make it easier for our many public and private sector stakeholders to conduct varied and numerous transactions, from approving mortgages to creating legal certificate documents,” said Hon. Melford Nicholas, Minister of Information, Broadcasting, Telecommunications & Information Technology at the Government of Antigua and Barbuda. “Its successful deployment is a positive step in securing our citizen’s identities and a critical precursor to transforming us to a digital society.” Data accuracy HID Integrale for CRVS also provides Antigua and Barbuda with a solid and secure identity foundation that offers benefits beyond accurate citizen identity data. The solution can be leveraged to generate reports and vital statistics that will enable participation in programs and assistance provided by the United Nations and other international organizations. “Antigua and Barbuda’s transformative civil registry deployment is a significant first step in its journey to becoming a digital society,” said Craig Sandness, Senior Vice President and Head of Secure Issuance and Citizen ID Solutions, HID Global. “Government officials and stakeholders are now strongly positioned to meet future identity challenges and expand their innovative civil registry ecosystem with our HID Integrale for CRVS solution.”
HID Global, the globally renowned company in trusted identity solutions, has announced that it has deployed the government of Libya’s first diplomatic and special ePassport program. HID Integrale HID Global provided Libya’s Ministry of Foreign Affairs (MOFA) with HID Integrale, a secure end-to-end solution that expedites the application and issuance processes and manages the entire ePassport lifecycle. For improved security, the redesigned and modernized booklets include a durable polycarbonate data page and are personalized using new laser engraving and chip encryption equipment. HID Global designed, engineered and delivered the identity solution to the Libyan government in four months, even amid travel restrictions due to the COVID-19 pandemic. Robust and complete ePassport system We are pleased that our collaboration with HID Global has yielded a robust and complete ePassport system" “We are pleased that our collaboration with HID Global has yielded a robust and complete ePassport system that we have seamlessly integrated with our existing processes,” said Mohamed Elkoni with Libya’s Ministry of Foreign Affairs. Mohamed Elkoni adds, “HID’s identity document expertise, the delivery of the solution in record time against the current restrictive backdrop, and ongoing technical support has greatly simplified the implementation of our new systems.” Public key infrastructure (PKI) service To ensure compliance with ICAO standards, HID Integrale’s public key infrastructure (PKI) service creates and manages Libya’s Country Signing Certification Authority (CSCA) keys and certificates to sign personalized eDocuments and enable verification. By implementing the PKI service, Libya can connect with the ICAO Public Key Directory, which enables the global use of their new ePassports and the potential for future security enhancements, such as biometrics. In addition, the solution’s web-based platform makes it possible for HID engineers to efficiently train the ministry’s staff as part of HID Integrale’s customer support package. Issuing secure diplomatic and special ePassports “A successful migration to an ePassport system requires a solution that enhances each touchpoint of the user experience, from application to travel,” said Craig Sandness, Senior Vice President and Head of Secure Issuance and Citizen ID Solutions with HID Global. Craig Sandness adds, “By opting for HID’s Integrale software suite, the Libyan government has created a solid and future-proof foundation to issue diplomatic and special ePassports.”
Aiphone Corporation (Aiphone), the renowned international manufacturer of intercom and security communication products, has installed its IX Series intercom system at the Roselle Catholic High School in Roselle, New Jersey. Roselle, like many educational facilities across the country, found itself relying on outdated technology and the inability to communicate from classrooms to a main office or centralized security location, a safety risk in any educational institution. IX Series IP Video Intercom System The high school was awarded a grant through the state of New Jersey to implement security improvements. The school chose an Aiphone IX Series Peer-to-Peer IP Video Intercom System, which included two master stations, two video door stations, and 43 audio sub stations to connect each of its classrooms. This new system allows the school’s front office staff to respond to visitor access requests at the main entrance, while also making visual confirmation before admitting anyone inside the building. To handle access requests, the school is equipped with two touchscreen master stations, one located at the front office and the other in the principal’s office. Building-wide pre-recorded notification The Aiphone IX Series can send a pre-recorded notification building-wide An invaluable feature for the school is that it allows teachers to communicate directly to the front office, so that they can also quickly initiate a lockdown to the entire school, in case of an emergency. The Aiphone IX Series can send a pre-recorded notification building-wide, there by alerting students and staff of any threats and providing instructions on what to do next. “With the previous system being unable to talk back to the main office, teachers were left in a bad spot if they ever had to reach an administrator for an emergency,” said Roselle Catholic High School Principal, Tom Berrios, adding “With these improvements, the teachers now feel more secure with what’s going on in the building and they have an easier way to communicate.” ‘Hot button’ capability “This feature is considered a ‘hot button’ capability, because it allows the school to create a pre-recorded message for emergencies,” said Ed Maffey, President of Maffey’s Security Group, the systems integrator tasked with the installation. Ed Maffey adds, “With one push of a button, a pre-recorded message will play continuously and can be used for a variety of scenarios, including fire drills, emergency evacuations, and lockdown situations.”
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?