Integration software
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services.&n...
AlgoSec, the network security management solution vendor, has introduced enhanced application visibility and auto-discovery features, and extended its integrations with SDN and SD-WAN solutions, in the new version of its core Network Security Management Suite. AlgoSec A32 version AlgoSec’s new A32 version gives IT and security experts the most comprehensive visibility and control over security across their entire hybrid environment. It enables organizations to align and manage their netw...
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27”, and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points, or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity...
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security...
The global pandemic has created a working environment filled with uncertainty and, at times, fear, as COVID-19 cases surge yet again and businesses continue to navigate a complex web of infectious disease mitigation protocols and managing the distribution of a potential vaccine. Organizations are operating in an environment where a critical event, posing significant risk to its employees and daily operations, could occur at any moment. Even with a vaccine showing light at the end of a very dark...
News
Green Hills Software, the pioneer in embedded safety and security, announces the release of µ-visor™, its safe and secure embedded virtualization hypervisor, for the Renesas RH850/U2A microcontroller (MCU). Designed to support the emerging automotive cybersecurity requirements of ISO/SAE 21434 and UNECE WP.29 and to meet ISO 26262 ASIL D functional safety, µ-visor for MCUs expands Green Hills leadership in safe and secure virtualization technology and its product line. µ-visor joins the proven, broadly deployed INTEGRITY Multivisor® virtualization for application processors already used in tens of millions of commercial vehicles worldwide. Multiple virtual machines µ-visor is the basis for safe and secure consolidation of multiple MCU-based systems onto a single multicore RH850/U2A design, enabling savings in cost, size, and power for the resulting consolidated system, while at the same time simplifying the safety design of the system. µ-visor allows multiple virtual machines to run simultaneously, supporting a variety of scheduling By employing the advanced hardware-based assisted virtualization capabilities of Renesas’ RH850/U2A, µ-visor allows multiple virtual machines to run simultaneously, supporting a variety of scheduling and core management strategies to meet various automotive uses cases and to ensure extremely low overhead. The Green Hills MULTI® integrated development environment (IDE) and related ISO 26262 ASIL D-certified tools provide developers with tightly integrated tools that deliver unprecedented visibility into system performance and runtime behavior, enabling rapid integration and optimization of multiple workloads onto a single RH850/U2A MCU. Hardware virtualization function µ-visor can host a variety of operating systems, including AUTOSAR environments from third-party vendors, Green Hills Software’s own µ-velOSity™ operating system, customer in-house operating systems, or micro-executive designs, giving customers a great deal of flexibility on how to design consolidation for their automotive controller use cases, including support for ECU safety islands. The Renesas RH850/U2A is the world’s first MCU with embedded flash that integrates a hardware-based virtualization-assisted function while maintaining the fast, real-time performance that customers expect of the RH850 products. The hardware virtualization function supports ISO 26262 ASIL D functional safety, enabling greater levels of system integration of the safety applications of automotive OEMs and Tier 1s into a single, unified MCU-based electronic control unit (ECU). Multiple software services µ-visor from Green Hills Software fully supports all of these advanced capabilities To support ASIL D, the hardware-based virtualization technology allows customers to implement multiple software services with different functional safety levels on the RH850/U2A MCU that can run concurrently without interference while maintaining the hard real-time deterministic performance required to control modern and future vehicle functions. µ-visor from Green Hills Software fully supports all of these advanced capabilities. “Renesas and Green Hills have been working together for decades to provide the best functional safety solutions for Renesas MCUs for our mutual customers,” said Naoki Yoshida, Vice President of Automotive Digital Products Marketing Division at Renesas. Challenging consolidation requirements “Renesas RH850/U2A’s hardware-based virtualization assisted technology and Green Hills Software’s extensive experience with virtualization and Renesas’ products is a natural combination. We’ve worked together to address our customers’ most challenging consolidation requirements, and µ-visor enables the full utilization of the advanced capabilities of our latest MCUs.” “Green Hills Software’s virtualization technology for application processors is already in production in tens of millions of vehicles today,” said Matthew Slager, Vice President of Asia-Pacific Operations at Green Hills Software. “By extending our virtualization technology expertise and experience into the MCU market with µ-visor and working with Renesas, Green Hills Software can offer best-in-class performance, functional safety and cybersecurity on the RH850/U2A, allowing automotive customers to achieve the challenging goals of developing and deploying highly performant and entirely safe and secure ECU consolidation.”
ComNet, Communication Networks of Danbury, Connecticut, an ACRE company, and a USA-based manufacturer of fiber optic transmission and networking equipment, is expanding the line of Cybersecurity products by adding to its line of intelligent media converters. These intelligent media converters with Link Guardian create a physical layer of protection that limits network traffic to one-way communication between the source and destination networks. The ComNet CNGEUMC4+2(TX, RX)/M is designed to prevent cybersecurity attacks by limiting data flow to one direction between a secured and unsecured network. External cyber threats How the devices are deployed will determine which direction the data will flow. Called a ‘Unidirectional Media Converter’, this physical security is more effective than software-enabled network firewalls. This data connection is un-hackable and invulnerable to malware. The ComNet CNGEMUMC4+2(TX, RX)/M is a hardened four-port all-gigabit intelligent Media Converter. This product is designed to provide deterministic data transfer in only one direction (unidirectional), to segment and protect networks, devices, and other digital assets (databases, historians, SCADA, PLCs, DCS, etc.) from external cyber threats. Distance extending device The primary purpose is as a distance extending device, but they can also be used as an entry point to a network" It has four 10/100/1000Base-T(X) copper ports and two 1000Base-FX SFP ports. It effectively only allows data to travel in one direction. The CNGEMUMC4+2(TX, RX)/M provides exclusive functionality for easy field deployment including DIP switch-based operation of RSFP (redundant SFP) for creating redundant fiber connections. According to Andrew Acquarulo Jr., ComNet CEO and President, “Media converters are generally simple to use. The primary purpose is as a distance extending device, but they can also be used as an entry point to a network. By adding features such as Link Guardian, we are offering our customers another way of making their network more reliable and secure from unauthorized access. This keeps us front and center in terms of innovation.” More competitive position The company believes that these features give them a more competitive position in the market and allows ComNet to be unique and differentiate the product line. “Making any network operate more efficiently and effectively is another way of how ComNet moves the market. Cybersecurity/ unauthorized access is a monumental concern for all security networks.” “By leading with our advanced technology, such as Link Guardian, we position ComNet and our solutions as the company to turn for ‘new and better’ transmission options. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing.
Finbarr Solutions, a foremost global security & risk management consultancy, announced the launch of free face-to-face video consultations with a member of the Register of Chartered Security Professionals. The service is available to any organization that would benefit from expert independent advice, regarding their security requirements and systems, manning levels, and/or security postures. Assess security provision The Register of Chartered Security Professionals was established under a Royal Charter issued to the Worshipful Company of Security Professionals in the UK and was launched in 2011. It is widely recognized as the gold standard of competence in the security industry. Ciaran Barry CSyP is the Managing Director of Finbarr Solutions and joined the Register in 2019. Ciaran comments, “January is often an ideal time to assess security provision for the year ahead, whether it is reviewing the performance and ongoing suitability of existing systems, preparing tenders for new services and solutions or assessing skills and training requirements.” Free consultation Many small organizations don't have easy or affordable access to expertise, thus Finbarr is launching free consultations The 30-minute free consultation can also be guided by a specific issue or topic such as handling sensitive workplace investigations, legal requirements for employees working from home, or dealing with cybercrime. Ciaran cites specific guidance that every organization can benefit from, in terms of preparedness and agility, to face the uncertainty of the year ahead, “Last year many business continuities and crisis management plans were conceived and initiated on the fly.” “It is important to frequently take stock of what is working, what needs to improve, and how to go about making the right decisions. Many smaller organizations struggle as they don’t have easy, or affordable access to expertise. It is for this reason Finbarr Solutions is launching free consultations.” CSyP education & experience In addition to the CSyP post-nominal, Ciaran has a Diploma in Security Management (with Distinction), a BA Hons Degree in Business Studies and holds an ASIS Certified Protection Professional qualification (CPP). During his career, Ciaran has also spent ten years serving in the British Army and eight years at Hertfordshire Constabulary as a detective.
TechAssure, the global network for insurance brokers specializing in technology risks, is partnering with CyberCube to roll out its Broking Manager product to the network’s members worldwide. Formed in 2000, TechAssure is a not-for-profit association headquartered in Davidson, North Carolina. TechAssure’s network consists of 30 retail brokerages servicing over 5,000 technology and life science clients globally. Software service application Broking Manager is the first software-as-a-service application CyberCube has built specifically for the insurance broking community. It offers a streamlined approach to generating financial exposure impact that helps clients make informed decisions on coverages and limits. Broking Manager will allow TechAssure’s member firms to quantify and explain to their clients the sources and financial impact of cyber risk exposure. The platform also produces reports that can be used to educate prospects and clients on potential sources of loss, recent and relevant cyber events, and peer-to-peer benchmarking. Cyber risk Pascal Millaire, CEO for CyberCube, said, “As trusted advisers to technology businesses all around the world, TechAssure’s member firms are only too aware of the rapidly changing nature of cyber risk.” “That makes it particularly pleasing that they’ve chosen to partner with us. This is a real vote of confidence in CyberCube’s products and the insights they generate.” Leading analytics platform TechAssure Executive Director Garrett Droege added, “TechAssure is very excited about partnering with CyberCube to add value to our members through analytics.” “By using a state-of-the-art software product, TechAssure members will be able to deliver best-in-class guidance on cyber risks for their clients in the innovation ecosystem. As leaders in the technology risk space for over 20 years, TechAssure sees CyberCube’s Broking Manager as one of the leading analytics platforms available for cyber risk management.” Broking Manager complements CyberCube’s two other products: Portfolio Manager and Account Manager, which are designed for risk carriers and are used by leading companies across the insurance ecosystem.
Alarm.com has developed the first cellular sensor with virtually no range limitations for monitoring valuable property and assets. The Alarm.com Flex IO™, a battery-powered device that is weatherproofed for outdoor durability, uses the latest LTE-M technology to operate anywhere there is LTE coverage and without a panel, hub or even Wi-Fi. The one-of-a-kind sensor works as a standalone solution or as an expansion of a person’s existing Alarm.com-powered system. The Flex IO™ sensor sets up in seconds and can be attached to almost anything to help people keep an eye on doors, gates, sheds, barns, detached garages, guest houses and other access points around their property. Expected battery life In addition, the wired magna-loop input option keeps users informed if freestanding items, like a motorcycle or lawn mower, are moved. “I’m extremely impressed by the Flex IO sensor after testing it as both an outdoor gate sensor and with the wired loop,” said Charles Hadsell, CEO of ePropertyCare. The Alarm.com Flex IO has an expected battery life of more than two years “The use cases for it seem almost limitless. Many of our customers come to us looking for help securing and monitoring things in areas outside the reach of their existing system. The Flex IO sensor is what we’ve needed to solve those challenges. I think it’s going to be a big hit because there’s nothing else like it on the market.” The Alarm.com Flex IO has an expected battery life of more than two years and seamlessly integrates with the existing Alarm.com ecosystem of connected smart home devices. Smart property monitoring Subscribers can stay informed about pertinent activity detected by the Flex IO sensor through real-time notifications and customizable alerts configured through the Alarm.com mobile app. “The Flex IO sensor expands the boundaries of smart property monitoring while redefining the uses for an activity sensor,” said Alison Slavin, co-founder and senior vice president at Alarm.com. “It’s an extremely versatile solution that’s ready for the challenge of what home or business owners want to monitor without being restricted by location.” The Alarm.com Flex IO offers enhanced awareness for property owners, one of the key elements of security. As a standalone solution, Flex IO also can be used in other applications where consumer needs have gone unmet due to range restrictions. The device is currently available through authorized Alarm.com partners. Flex IO is a trademark of Alarm.com.
Alarm.com has released the first commercially available video doorbell that rings without requiring any contact to reduce public health risks and make home visits and deliveries safer for all. The Alarm.com Touchless Video Doorbell is the next generation of video doorbells, combining sleek design with some of the most advanced video intelligence available to consumers for touch-free operation. It is the latest technology innovation from the company that pioneered smart home security. Touchless Video Doorbell The Alarm.com Touchless Video Doorbell eliminates the need to physically press a doorbell button. Anyone coming to the front door simply stands on a doormat placed at a safe distance to ring the chime. Rather than using motion detection common to other doorbell cameras, rapid and accurate person detection activates the Alarm.com Video Doorbell to reduce unimportant interruptions. When a person is detected, the doorbell immediately triggers the existing chime in the home, sends a mobile alert to the homeowner and starts recording a video clip. Homeowners can see and speak with visitors through the Touchless Video Doorbell’s live HD video and two-way audio instead of having to answer the door. Touchless security solution Our Touchless Video Doorbell helps homeowners and visitors alike maintain social distance" “Protecting the health and safety of loved ones and our communities has never been more important,” said Anne Ferguson, Vice President of Marketing at Alarm.com, adding “Particularly in the current environment, our front doors have become an even greater hotbed of activity.” Anne adds, “Our Touchless Video Doorbell helps homeowners and visitors alike maintain social distance and avoid encountering germs, bacteria and viruses that may exist on surfaces around the front door. Adding this touch-free solution to an Alarm.com-powered smart home security system is another way we can stay vigilant and protect one another.” Home automation As an integrated part of the expansive Alarm.com ecosystem, the Touchless Video Doorbell can automatically trigger other device activity through user-defined rules. For example, lights can turn on when the doorbell detects a person. Rapid people detection also helps ensure that inadvertent chimes are not triggered by animals, packages or other non-human objects. The device also features: 150° vertical field of view that gives homeowners a full head-to-toe image of visitors and clear look at packages left on the doorstep. Optimized portrait viewing on mobile so there’s no need to rotate the mobile device. Full HD resolution, HDR, and infrared night vision. Onboard heater for low temperature operation. Live video and saved clip viewing using the Alarm.com mobile app or website. The Alarm.com Touchless Video Doorbell will be available through the company’s robust network of professional security service providers.


Expert commentary
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
This year has brought about changes in virtually every sector. As with other frontline industries, the security sector has been tested more than those able to move entirely to remote working. While the promise of a vaccine means an end is in sight, the post-COVID era will not bring with it a return to the ‘normal’ we knew before the pandemic. Organizations have adapted, becoming more resilient and agile and this will have lasting effects. The coming months will continue to be testing. The tiered system will see the precautions in place fluctuate with the situation. Initial lockdown period At the same time, a gradual return to normal as the vaccine is rolled out will require adaptive measures. The security sector will be at the heart of keeping people safe throughout this process. The initial lockdown period and the first wave of panic buying might seem like a lifetime ago. However, the introduction of the second lockdown in November was accompanied by another wave of stockpiling despite organizations trying to reassure their customers. It is uncertainty that breeds anxiety, and we continue to see this as the restrictions fluctuate across the country. The tier system depends upon a number of factors: case detection rate, how quickly case numbers are rising or falling, positive COVID-19 test numbers in the general population, pressure on the NHS in that region, and local context and exceptional circumstances. Social distancing measures For the sector to meet demand, technology will be needed to work alongside the manned guarding role While travel is allowed in all tiers if necessary for work, government advice still recommends that those able to work from home should do so. This means that throughout the country, many buildings will remain empty or at minimal capacity for some time to come. Security risks vary with the restrictions in each area. Although shops are largely open, tier three still requires the closure of many premises. Vacant premises are more vulnerable to theft and damage, meaning officers and security technology remain in higher demand than usual. As more premises are allowed to open, the need for officers to implement social distancing measures increases, stretching the sector like never before. For the sector to meet demand, technology will be needed to work alongside the manned guarding role. Temperature checking devices It will continue to be important in providing security when officers cannot be present in person through CCTV and sensors. But it will also be integrated into the manned guarding role to streamline processes. We are already seeing the start of this as many officers are using handheld temperature checking devices to reduce the spread of COVID-19. We’ll also see temperature scanners installed into buildings to allow security guards to focus on other priorities. Those businesses that are open will need to continue to adapt to the changing regulations in the coming months. Christmas is a busy period that stretches the retail sector. Unpredictability results in heightened stress levels and makes it more difficult for people to reliably take in and recall information. Security officers are a key first point of contact both to enforce measures and reassure anxious staff and members of the public. Enforcing one-Way systems Security staff will need to keep members of the public safe and prevent disruption Some shops are enforcing one-way systems and limiting the number of customers allowed inside. Over Christmas, many more may choose to do so. Security officers will be responsible for ensuring these precautions are followed. With the heightened pressure of the festive period, it can be hard to predict how members of the public will respond to officers enforcing measures. Security staff will need to keep members of the public safe and prevent disruption. Doing so will require tact and empathy in dealing with customers. Within shops, too, officers will be tasked with ensuring social distancing and other measures are followed effectively. Doing so, they must work closely with clients to understand what protocols are in place and how to handle a breach. They must also be able to enact discretion. For example, clients may not take issue with protocols being broken momentarily or accidentally. Extensive government guidance There is extensive government guidance on the precautions that should be taken on various premises. They include the introduction of one-way systems and limiting building capacity. Measures such as one-way systems may be broken by those that don’t notice or don’t care. Officers must be able to judge what responses are appropriate while maintaining a calm and reassuring presence. The security officer role has long been moving toward a more front of house position as, for many visitors to a building, they are the first point of contact. The pandemic has accelerated this trend. Working on the frontline of the pandemic, officers have had to play a more multifaceted role than ever before. Officers still act as deterrents and manage security issues, but they must also use empathy and strong communication skills to inform and reassure customers and staff onsite. Adapting to new technology They will need to be able to learn quickly on the job and adapt to new technology and practices Being able to demonstrate this flexibility and to read a situation and react appropriately will be some of the skills most in demand in the industry in the future. Officers will need to build close working relationships with clients. In addition, many will have new roles, such as taking temperatures with handheld devices. They will need to be able to learn quickly on the job and adapt to new technology and practices. Technology, too, will be more important. If the global pandemic has driven any point home, it is that we cannot always see or sense threats. Data-Driven insights Temperature checks and occupancy sensors will be the norm in protecting from COVID, while security technology and data-driven insights will continue to grow in popularity. The security sector specializes in adapting to the unexpected and the threatening. It continues to demonstrate incredible value through the pandemic. While the coming months will undoubtedly be trying, the sector is adapting. Lessons have been learned from the pandemic that will affect business globally. Security specialists are taking these on and creating a stronger and more effective industry.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
Security beat
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realization of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyze their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programing interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyze their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As Internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centers and additional staff in business development, sales and support roles.
Case studies
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live. Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhere across the network. Synergy hybrid cloud software The new capabilities, including an innovative mobile application, mark a revolutionary step forward in the way operational command, control, and communications are carried out within urban rail environments. The project, which went live as scheduled on 1 January, is the result of an innovative partnership between S-Bahn Berlin GmbH (a subsidiary of Deutsche Bahn) and command and control solutions expert, Synectics. The two companies’ combined ambition has led to the development of a tailored system that delivers a positive customer experience both now and well into the upcoming decade. Integration with S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to and interoperates with S-Bahn’s proprietary systems, as well as all third-party technologies, devices, and communication solutions vital to passenger service, safety, and security. This is achieved in real time, and continuously informed by sensor data obtained from integrated systems crucial to operating safe and efficient passenger services. The new Synergy mobile application will enable S-Bahn’s workforce to receive automated task assignments based on their role, skills, and location, and to directly update the system on their delivery of those tasks, the sophisticated level of integration and interoperability achieved is unprecedented. Intelligent digitization of workflows Henning Oelze, Project Manager at S-Bahn, commented “Synergy’s powerful integrations, intelligent digitization of workflows, workforce management capabilities, and computer-aided dispatch functionality combine to deliver a hugely exciting outcome. The platform offers complete visibility of network-wide activity and the ability to coordinate and automate the right response, at the right time, to any requirement.” Henning adds, “It was with huge pleasure that we saw our first trains and Security and Service teams utilizing the new Synergy system, especially given how challenging this last year has been. It really is a revolutionary step forward in our mission to deliver outstanding passenger service, while at the same time, making life much easier for our personnel through the advanced automation of operational processes.” Rapid resource communication and deployment From fulfilling a planned maintenance task to sending people with the most appropriate training to deal with an evolving security or safety issue, Synergy will facilitate the rapid communication, deployment, and appropriate action of different teams. This will equip S-Bahn to process and react to events within pre-defined response times, and to manage its workforce as effectively as possible. The project is scheduled to continue during 2021, with the two organizations building further technical capabilities and driving ahead with continuous improvement. Key enhancements will see extensions to the workforce management functionality and more developments to improve operational efficiency within incident and task management assignments. Smart transport systems standards Some of the software developments driven by this project will have long term implications for the sector" Greg Alcorn, Director, Global Sales & Customer Success at Synectics, said “S-Bahn Berlin is viewed as a technological trail-blazer and we’ve thoroughly enjoyed working with such a well-organized team to deliver the first step in their truly inspirational vision for urban transport.” Greg adds, “Some of the software developments driven by this project will have long term implications for the sector. I have no doubt that there are new standards being set here for smart transport systems of the future.” Future of smart transport operations In addition to the ground-breaking technology used, the project also demonstrates the advances that can be achieved through international collaboration. Henning Oelze stated, “Having such direct access to Synectics’ product development team in the UK and knowing that they understood how agile we needed this solution to be, has made a huge difference." He adds, “They shared our vision for the future of smart transport operations in a major European capital and worked in close partnership with the S-Bahn team, successfully navigating their way through the technical, logistical and cultural challenges of a major international project. The close nature of this collaboration is the reason we have reached this crucial go-live milestone, despite all the hurdles that 2020 put in our way.”
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
HID Global, the globally renowned company in trusted identity solutions, has announced that Bay State College safely brought its students back to its campuses in Boston and Taunton, Massachusetts using a digitized contact tracing solution that includes HID Bluetooth BEEKs Beacons to provide real-time location services. HID Bluetooth beacon The HID Bluetooth beacon is in the form of a simple badge holder that is used to carry existing ID badges for students, faculty, staff and guests. The beacons are part of a robust solution that makes it possible to quickly and easily perform contact tracing, removing the manual and time-consuming effort to identify who has been in contact with whom on campus. “Contact tracing is a key component for safely operating our campuses and considered by health departments to be one of the most important efforts to help slow the spread of COVID-19,” said Jeffrey E. Myers, Chief Information Officer with Bay State College. Contact tracing solution He adds, “HID BEEKS beacons are carried by each person on campus as part of our solution that enabled us to safely resume in-person classes and keep our campus operational should isolated parts of our community find themselves infected.” The HID BEEKS Bluetooth Low-Energy (BLE) beacons provide the starting data that Bay State College’s contact tracing solution uses to calculate the time, place, and proximity of faculty, staff, and students while on the college’s two campuses. HID BEEKs Beacons HID’s offering is part of a broader platform that provides smart building and optimization capabilities" The information from the beacons enables college administrators to comply with state and local occupancy mandates and, when needed, rapidly respond to cases. Logs are maintained only for the 14-day period required for contact tracing, and the university has adopted strict privacy policy guidelines for data use and access. “We are very pleased that Bay State College has used HID BEEKs Beacons to help streamline and accelerate the often daunting task of contact tracing,” said Mark Robinton, Vice President of IoT Services at HID Global, adding "In addition to creating a completely digitized approach to this process, HID’s offering is part of a broader platform that provides smart building and optimization capabilities that extend well beyond today’s pressing need to stem the spread of COVID-19.” HID Location Services HID BEEKS Beacons are part of a complete HID Location Services for Workplace Safety that also simplifies and streamlines how to manage social distancing. These workplace safety solutions build on the company’s comprehensive HID Location Services platform, deployed by Fortune 500 companies worldwide, to manage building occupancy, optimize office and facility space, improve energy efficiency and enhance security. The platform can also monitor assets as well as the condition and health of industrial equipment.
MSC Mediterranean Shipping Company S.A. (MSC) is the world's second-largest shipping line in terms of container vessel capacity. It operates 480 offices across 155 countries worldwide with over 24,000 employees. MSC’s shipping line sails on more than 200 trade routes, calling at over 315 ports. Challenges MSc searched for options to manage attendance in the office spread across 15+ locations. A central server that can handle the capacity of 1000+ users and can seamlessly integrate with their accounting software - SAP. Additionally, they required a fool-proof solution that can assist them to manage multiple shifts with automated shift correction options and work hour’s calculation in overnight shifts and more. Solution The offered solution deploys the access control solution that enables complete security of all their units Matrix addressed these challenges by proposing a Door Controller for the locations connected by a central platform. This Time-Attendance Solution helps them to procure accurate attendance details of an employee in no time. Furthermore, this attendance data is integrated with accounting software - SAP for seamless attendance and payroll management. The offered solution deploys the access control solution that enables complete security of all their units. COSEC PVR Door Controller - a contactless biometric that is engineered to offer the utmost security, eliminates the risk for forgery or identity duplication. Results Effortless attendance management of all location from head office Multiple connectivity options Streamlined shift allocation and automated shift correction Seamless integration with SAP Customized attendance policy formation Real-time alert on attendance related event and auto scheduled reporting No correction required for overnight shift environment Products and Solutions Offered: COSEC PVR DOOR CONTROLLER - Palm Vein Door Controller COSEC CENTRA LE - Application Server Platform with 1000 Users COSEC LE TAM - Time Attendance Software Module COSEC LE ACM - Access Control Software Module
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles. Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory. HID Trusted Tag Services HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays “HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service. HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service. Anti-counterfeiting technology Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services. “With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilize this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.” NFC technology and cloud authentication services “HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global. Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorized and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorized to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorized fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilize the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorized entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.


Products


Round table discussion
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
White papers

Combining Systems Intelligence And Human Insight For Superior Security
Download
Why Outdated Access Control Systems Are a Big Problem
Download
Preparing Your Organization With Quality Situational Awareness
Download
Three Reasons To Upgrade Your Access Control Technology
Download
House Of Smart Cards - How Assumptions Can Open Dangerous Security Gaps
Download
