HID Global, a pioneer in trusted identity solutions, announces that users of its cloud-based PKIaaS offering can now automate the lifecycle management of digital certificates used with devices managed via the Microsoft Intune mobile device and application management service.
The HID solution eliminates the need for human intervention when issuing and renewing certificates that enable employees to use their mobile devices to easily access their organization’s resources through Wi-Fi networks or virtual private network (VPN) connections, without passwords.
Simple subscription model
WHO: HID Global, whose PKIaaS platform offers the advantages of a simple subscription model for automating digital certificate management across large numbers of mobile devices using Microsoft’s Intune service.
WHAT: The HID PKIaaS offering adds a rich suite of certificate automation capabilities to the Microsoft Intune mobile device onboarding and management process. HID is a Microsoft-approved third-party certification authority (CA) partner supporting the Intune service and its use of the Simple Certificate Enrollment Protocol (SCEP).
WHY: Out-of-the-box integration with Intune, Azure AD, and third-party SCEP servers enables the HID service to seamlessly automate all certificate provisioning and renewal. The HID service also enables users to scale their PKI-based strong authentication and encryption capabilities so they can secure hundreds of applications and up to tens of thousands of workstations, mobile devices and other endpoints.
HOW: The HID PKIaaS service is integrated with Microsoft’s Azure Active Directory (Azure AD) and is listed on the Azure Marketplace.
Providing complete control
Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) service that integrates with Azure AD to control how organizations’ devices are used. It also allows administrators to push digital certificates to mobile phones and tablets (iOS/IPadOS and Android) as well as laptops (MacOS/Windows) to provide the easiest, most secure way to access Wi-Fi networks and VPNs.
HID’s cloud-based PKIaaS platform is unique in supporting both privately issued and trusted Transport Layer Security/ Secure Socket Layer (TLS/SSL) certificates, and also hosts private Intermediate Certificate Authorities (ICAs). It offers the industry’s broadest range of certificate automation features under a single annual subscription fee, including providing complete control, delegated administration, and on-demand auditing and reporting.
HID Global, a globally renowned company in trusted identity solutions, has announced that it is the world’s first ticketing solution provider with a software development kit (SDK) that is fully certified and compliant to Calypso HCE standards, for secure and convenient mobile ticketing on smartphones.
SDK certified to Calypso Standards
The certification specifies how to protect ticket data stored in the mobile device’s wallet, helping transport operators to effectively fight fraud, by preventing tickets from being duplicated, transferred or altered.
“Calypso Networks Association (CAN) is pleased to issue to the HID SOMA Atlas 4Digital SDK, this first certificate of compliance, with the security requirements established for the HCE Calypso mobile ticketing application. This solution offers transport operators flexible, fast and secure solutions that comply with the principles of the most stringent mobile security programs,” said Philippe Vappereau, the Chief Executive Officer (CEO) of the Calypso Networks Association (CNA).
Open standard for contactless ticketing applications
Calypso Host Card Emulation (HCE) standard extends the success of CNA standards to mobile devices
Relied on by public transportation networks and cities around the world, Calypso is an open standard for contactless ticketing applications, in which Calypso cards and NFC mobile phones are used.
The Calypso Host Card Emulation (HCE) standard extends the success of CNA standards to mobile devices and the Calypso HCE Security Certification (CHSC) combines a state-of-the-art evaluation methodology, with the most stringent requirements of mobile security programs.
Security-by-design approach for identity solutions
“Being at the forefront of achieving this certification underscores HID’s long-standing commitment to a security-by-design approach, to building trusted identity solutions for our customers,” said Cesare Paciello, the Vice President, Events & Mobility Solutions with HID Global.
Cesare Paciello adds, “Following HID’s world’s first certification for Calypso Light in 2018, this new industry-first milestone positions HID to continue leading the way for public transportation networks to implement next-generation automated fare collection solutions. In addition to delivering advanced security to safeguard against cloning, eavesdropping and other cyber threats, the HID SOMA Atlas 4Digital SDK enables easier, more streamlined mobile ticketing.”
Mobile tickets, powered by HID SOMA Atlas 4Digital SDK
Mobile tickets, powered by the HID SOMA Atlas 4Digital SDK, can be used with Near-Field Communication (NFC)-enabled smartphones, just like any paper or card-based tickets that meet the Calypso standard. The HID SDK also enables transport operators and authorities to greatly expand the range of devices that customers can ‘tap to pay’ for travel using Android smartphones and other NFC devices.
Additionally, passengers can also use their mobile devices to add funds (‘top-up’) their Calypso-based transport cards, making it even easier to pay and use public transport, while minimizing physical contact.
HID Events & Mobility Solutions
HID Events & Mobility Solutions provide end-to-end ticketing solutions, including transportation ticketing terminals, data capturing software, key management capabilities, RFID paper tickets, smart card tokens, smart wristbands, and other components. Its multi-application operating systems can be integrated with existing hardware.
The Physical Security Interoperability Alliance (PSIA) announces it has approved the Secure Credential Interoperability (SCI) 1.0 specification. The PSIA has been working with a broad group of industry pioneers in the access control industry to come up with this specification, which is likely to have a significant influence on the future of secure mobile credentials.
Mohammad Soleimani, the Chief Technology Officer of Kastle Systems and the Chairman of the SCI Work Group, introduced this concept to the organization in 2020 and has had a strong influence in engaging other companies in its development.
Compatible secure credential
“A standard for secure mobile credentials has been long overdue in the industry. SCI relies on established standards and the Public Key Infrastructure, to provide a simple, but elegant solution,” said Soleimani. SCI addresses the need for a universally compatible secure credential for the physical access control industry in the form of cards, fobs, mobile devices, and wearables.
Progress has been dramatic, with the technology being demonstrated at a PSIA technical meeting in August featuring apps from IDEMIA and Johnson Controls and a Kastle reader developed by WaveLynx. “It has been our mission from day one, to drive secure credentials and interoperability into the market” said Laurie Aaron, Executive Vice President at WaveLynx Technologies Corp. “Joining PSIA to collaborate and execute on a standard that is made available to all, has been a fast track to mission success.”
Different mobile platforms
The SCI specification helps the industry to take steps towards the last mile of credential evolution"
One of the important characteristics of SCI is its interoperability across different mobile platforms including iOS and Android or devices with the ability to generate ephemeral key pair, which can be communicated over various protocols such as BLE (Bluetooth Low Energy), NFC (Near Field Communication), and UWB (Ultra-wide band).
“The SCI specification helps the industry to take steps towards the last mile of credential evolution where interoperability of credentials can exist. The simplicity of the use of a public key leveraging standards and best practices ensure a secure and open way to manage credentials that takes proprietary out of the picture.” says Jason Ouellette, the Head of Technology and Business Innovation for Johnson Controls Access Control and Video Solutions business.
Security industries’ efforts
Participants in the spec development include, ASSA ABLOY, Deister Electronics, Farpointe Data (a dormakaba company), HID, IDEMIA, Kastle Systems, LenelS2, rf IDEAS, SentryCard, Siemens, and Johnson Controls.
“This is an important milestone in the security industries’ efforts to enable flexible, interoperable and scalable solutions,” states Peter Boriskin, Chief Technology Officer for ASSA ABLOY Opening Solutions Americas. “It will be essential to consider how this and other standards apply across various industries, and how current and emerging standards impact each other.”
RaySecur, a security imaging technology company with the world’s first DHS Safety Act-designated millimeter wave (mmWave) desktop scanner, for mail and package threat detection, announced that former Boston Police Commissioner, Ed Davis has joined the company’s Advisory Board.
Ed Davis will leverage his decades of law enforcement experience, in order to help RaySecur accelerate adoption of its flagship MailSecur mail and package threat detection solutions.
MailSecur scanners use safe mmWaves to see inside of objects. They can detect more and smaller threats than X-ray scanners, including explosives, weapons, radiation, and other suspicious contents, as well as liquids and powders at 300x the sensitivity of X-rays. Unlike X-ray scanners, there are no safety concerns or need for specialized training.
Mail threat incidents have been increasing, with the United States Postal Inspection Service (USPIS) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), responding to an average of more than 10 dangerous mail or package incidents each day, for the last three years. In the last 16 months, AstraZeneca’s COVID-19 vaccine plant, Subway Sandwiches’ corporate headquarters, and Dr. Anthony Fauci have all been victims of dangerous mail threats.
Mail and package threat detection
Mail and package threat detection is an underestimated and vitally important component of public safety"
Ed Davis stated, “Mail and package threat detection is an underestimated and vitally important component of public safety, and I’m excited to join the Advisory Board of a company that offers the only safe and scalable solution for organizations and individuals, to combat this problem.”
He adds, “It’s crucial that law enforcement, enterprises, correctional facilities and government institutions have access to this technology, and ensure they can seamlessly scan every package, in a quick and efficient manner. I look forward to working with RaySecur, to help meet this important security need.”
RaySecur's Advisory Board
Ed Davis is the latest addition to a world-class team comprising technology, military, security and law enforcement professionals. He has a 35-year proven track record and is the President and Chief Executive Officer (CEO) of business strategy and security services firm, Edward Davis Company.
Ed Davis served as the Boston Police Commissioner from December 2006 to October 2013, where he led the highly successful response to the Boston Marathon bombing. Prior to that, he was the Superintendent of the Lowell, Massachusetts Police Department for 12 years. Davis also serves on AT&T’s Advisory Board and was a former Safety Advisory Board Member at Uber.
Enhancing mail security
“We are honored to have an esteemed law enforcement figure, such as Ed Davis join our Advisory Board and help us continue closing the mail security gap,” said Alex Sappok, Ph.D., the Chief Executive Officer (CEO) of RaySecur.
Alex adds, “Ed’s strong interest in RaySecur not only highlights the importance of improving mail security across industry and government, but also our solutions, which can easily address the problem at scale.”
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organizations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing.
Most organizations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes.
The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security.
Vulnerabilities and challenges
In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalized and adopted into industry standards by the Security Industry Association in the 1990s.
Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities
There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources.
Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organizations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS.
Legacy access control protocol
Despite the well-publicized vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems.
This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors.
OSDP is a communication standard
Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously.
These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products.
Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard.
Why implement OSDP as a standard?
OSDP is the only protocol that is secure and open for communication between readers and controllers
The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organizations recognize the value of implementing an integrated solution to enhance security and add value to technology investment.
OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits:
1) Increased security
Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined.
2) Bidirectional communication
Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller.
3) Open and interoperable
OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection
OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system.
4) Reduced installation costs
OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices.
Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data.
5) User friendly
OSDP gives credential holders greater ease of use, with audio and visual feedback such as colored lights, audible beeps, and the ability to display alerts on the reader.
For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices.
Unlimited application enhancements
OSDP streamlines installations and upgrades while saving organizations the expense of replacing readers
OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment.
OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organizations can use systems from numerous manufacturers as they invest in infrastructure that maximizes the protection of critical data.
For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organizations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader.
Cost savings upon system upgrade
Integrators can also capitalize on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects.
Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers.
Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organizations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.
In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.
Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.
Revenue through mobile service
According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”
Revenues from termination are shared between all networks that help deliver the call
Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”
“Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”
Trading termination minutes
The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.
Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”
A simple but effective fraud
Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it.
The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes. A primary risk is SIM Box fraud.
SIM Box fraud
SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.”
One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box
“If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal. The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”
While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.
Loss of termination revenues
Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.”
“The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”
Is it illegal?
If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.
For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organized crime or people trafficking.”
“With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”
Other telecommunications fraud
Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues
Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.
While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.
The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable.
OTT app fraud
However, recently some OTT players are looking to terminate revenue to monetize their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”
“The call starts as a dialed telephone call, but the user receives it within an OTT app. If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”
Using an app to make calls
“Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”
According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”. This is defaulted to “on” when the app is downloaded. Only the most technologically savvy users would even know it was there.
Combatting the fraud against networks
Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible"
Why do networks not do more to combat fraud? The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”
“Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible. This has led to a mindset where whatever the questions the answer is always more marketing promotions.” A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.
An opportunity for the future
As mobile networks mature and become more commoditized, Gent believes the issues around combatting fraud will become a wider concern.
“If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behavior that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.”
While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024.
This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience.
Physical security technologies
Innovative physical security technologies can play a significant role in protecting a site while supporting its operation
Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded.
This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience.
Comprehensive integrated solution
To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room.
This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws.
As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention.
This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken.
Improving customer experience
Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers
Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required.
Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store.
The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience.
Utilizing data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings.
Designing a future proof solution
The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store.
This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behavior.
Physical security technology should be reliable and of high quality, without compromising the service to customers
VMS-based network solution
Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security.
Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customization while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve.
Additional security benefits
As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases.
To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global.
Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification?
Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains.
Q: Do universities continue to be the biggest users?
Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas
Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas.
Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown?
Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet.
Q: Is there another example outside the university vertical?
Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important.
Q: What have been the biggest mobile access advancements?
The mobile credential provides contactless, seamless access to a wide range of devices and services
Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications.
Q: Wearables are also having an impact.
Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication.
Q: What is the impact of the cloud?
Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations.
Q: What should end users look for in a mobile access solution?
Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy
Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences.
Q: Wonder what this market will look like in 10 more years. What’s next for mobile access?
Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market.
ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response.
AVERT security software
AVERT security software helps clients by increasing security effectiveness and reducing cost
AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap.
“Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO).
Technical roadmap for upgrading to AI-PSIM platform
“We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.”
Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object.
Rapid incident response and robotic sentries interfaces
ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response
ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries.
“These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta.
Optimizing security operations
ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.”
Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies.
Vidsys pioneered PSIM in the security industry and created a robust library of connectors
Managing security at multiple sites
Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.”
He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.”
Flexible and intelligent software
Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation
“The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta.
He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.”
SaaS-enabled and remotely hosted system
The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators.
In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations.
Next-generation of AI-PSIM
“ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.”
So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.”
He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls?
For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions.
“There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.”
Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”.
Challenge 1: Ensuring building readiness
After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped.
Challenge 2: workforce management
There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time
While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office.
Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns.
Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation.
Challenge 3: Controlling access
The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions:
Where have you visited in the days since last entering the workplace?
Have you come into contact with anyone else who has recently visited high-risk areas?
Have you shown any symptoms of infection in the past xx number of days?
Policies should be implemented that require employees to be screened regularly — and for an extended amount of time
If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organizations— often multiple times a day. This applies to interactions at delivery bays, too.
A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity.
Challenge 4: Social distancing and contact tracing plan
Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only.
Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies.
Challenge 5: Reduced physical touchpoints
Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces
Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access.
Challenge 6: Communicating for confidence
Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments.
Need for a centralized monitoring solution
Avolon’s new premises in the upscale Ballsbridge area of Dublin provided an opportunity for the company to rethink its approach to building security.
Avolon was looking for an innovative, flexible solution that could be personalized to individuals, easily accessed, and managed remotely. Additional requirements included: the need to provide different levels of security clearance in different areas of the building, the ability to manage individual security clearances, the facilitation of access outside of the usual workday, and secure parking lot access for employees and visitors.
As a global company, Avolon wanted a solution that could be deployed worldwide to provide a consistent experience for its employees, regardless of their location.
HID’s flexible access control solution
Powered by Seos® technology, the solution uses BLE and iCLASS® readers to create a secure access control solution
Avolon partnered with systems integrator Summit Security Systems Ltd and deployed HID Cellphone Access at its Dublin headquarters. Powered by Seos® technology, the solution uses Bluetooth Low Energy (BLE) and iCLASS® readers to create a secure, convenient, and flexible access control solution for its headquarters.
The building’s security system enables credentials on smartphones via an app rather than on physical access cards and uses iCLASS SE® cellphone-enabled readers installed at points of access.
Key benefits of a cellphone access system include:
Employees are less likely to forget smartphones, which they always carry than an access badge
Security clearances are more efficient and easily changed because security status is provisioned to an app
A cloud-based central control system provides security administrators with easy oversight, access to a complete set of metrics, and the ability to manage a network of premises around the globe
Employing various access control measures
Avolon has implemented a range of different solutions for different parts of its premises that can vary by time of day. For example, elevators utilize access control measures to ease the flow of people within the building during work hours, while assuring that after-hours access is more controlled.
Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry
The ease-of-use and security also extend to the parking lot, which benefits from HID’s “Twist and Goes” feature. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry.
Avolon encourages its employees to cycle to work and has extended cellphone access to a secure employee bike parking area that links directly into the shower and changing facilities.
Advantages of Cellphone access solution
The HID Cellphone Access Solution provides many advantages over the previous card-based system including after-hours access (vital to a 24/7 business like Avolon), ready access to secure rooms, and easy management of security clearances. With HID Cellphone Access, fine-grained security access for a global network of offices is controlled centrally through a cloud-based portal.
Access levels can be set on an individual basis so they are very flexible and can be modified as needed.
“Using a cellphone is much more convenient than access cards. People forget their access cards, but their cellphone is with them all the time,” said Allan Dawson, facilities project manager at Avolon. “It’s much more efficient. For example, we now have much lower instances of people leaving the perimeter and having to ask for re-entry because they’ve left their pass in the office.”
Worldwide installation of physical access solution
In the future, Avolon anticipates expanding its new physical access solution across its global campuses. “As well as deploying in our Dublin head office we have also deployed in our New York, Florida, and Hong Kong offices,” said Dawson.
“The benefit of using a global platform means our people can travel between offices with their security status intact and ready to go for each location.”
Embracing the benefits of touchless access using smartphones, Vanderbilt University expanded its investment into campus safety and security, by leveraging HID Mobile Access to deploy campus IDs on iPhone and Apple Watch via Apple Wallet.
The enhancement builds upon the university’s initial investment in mobile-enabled technologies from HID Global. These technologies capitalized on the ubiquitous nature of smartphones and mobile devices among students, 90 percent of whom reside on campus throughout their Vanderbilt education and faculty, to create a campus-wide identity and access management program.
HID Mobile Access
The investment continues to pay dividends. “Keeping students safe is our top priority. HID Mobile Access was the optimal solution for protecting students and allowing Vanderbilt to move to a mobile solution for securely accessing our campus and services. The integration of campus IDs on iPhone and Apple Watch brings added convenience for our entire campus community,” said Mark Brown, Director of Business Services Technology with Vanderbilt University.
Mark Brown adds, “Beyond the convenience and security, two very important considerations, this mobile solution gives us the freedom to provision and modify credentials remotely, which has been significant for protecting the health of our students and staff, during the worst of the COVID-19 pandemic in 2020.”
Compatible with NFC and Bluetooth technologies
Vanderbilt initially tapped HID Global to implement a mobile credential solution compatible with NFC and Bluetooth
Vanderbilt initially tapped HID Global to implement a mobile credential solution compatible with Near Field Communication (NFC) and Bluetooth technologies. HID Mobile Access, powered by Seos credential technology, was deployed alongside a reader infrastructure, comprising HID Signo Readers, HID iCLASS SE readers, and OMNIKEY desktop readers, in order to manage access to buildings.
It complements the ecosystem by facilitating the usage of the already issued credentials for all other adjacent use cases. The solution allowed Vanderbilt administration to issue mobile credentials that let students, faculty, and staff access buildings and services with their mobile devices, as well as efficiently provision/de-provision credentials remotely, without person-to-person contact.
HID Reader Manager
Next, the university wanted to add support for credentials in Apple Wallet, without compromising the existing access infrastructure or its security. This was easily accomplished by using HID Reader Manager to upgrade firmware on the university’s physical access control readers, so as to extend support for NFC-based credentials in Apple Wallet.
The university uses the flexible HID Origo Mobile Identities API integrated with CS Gold, a higher education transaction system from CBORD, for credential lifecycle management.
Commodore campus ID cards
With campus IDs in Apple Wallet, students can complete any action that would have previously required a physical ID card, both on and off campus, with just their iPhone and Apple Watch. Students simply present their device to a reader to enter dorms, libraries, and fitness centers, buy lunch, make purchases at campus stores, and pay for laundry, print documents, and more.
The university’s Commodore campus ID cards on iPhone and Apple Watch provide an extra level of security
The university’s Commodore campus ID cards on iPhone and Apple Watch provide an extra level of security and privacy, so students do not need to worry about misplacing their physical card, when they are enjoying campus life. Transaction history is never shared with Apple or stored on Apple servers. If a student misplaces their iPhone or Apple Watch, they can use the Find My app to immediately lock their device and help locate it.
Safe and secure mobile access solution
HID Global is pleased to support Vanderbilt University in achieving its goal of delivering a safe, secure, and convenient mobile access solution, with the added flexibility of supporting the Apple Wallet platform.
With integrated HID Mobile Access, issuing credentials to new users is as easy as having them download the app, validate identity, and seamlessly add their credentials to Apple Wallet.
Following a change in employment practices, created by the COVID-19 pandemic, many office-based employees now follow a hybrid schedule, working where they are needed or find convenient. The fast-growing use of flexible offices and co-working spaces is a testament to this emerging trend.
With employees coming and going as they please, a change in how security and access control are managed is an urgent, but overlooked aspect that many firms are just waking up to now.
Clockwise, renowned office space provider
Clockwise is the UK and European provider of flexible office space for entrepreneurs and established businesses. The company’s expanding offering includes contemporary offices, meeting rooms, and shared workspaces, across multiple cities.
Any business, which relies on flexibility, places high demands on door security and access control. Clockwise needs a broad choice of electronic devices to secure meeting rooms, private offices, communal spaces, and main entrances, which may not all require the same lock type.
Access management should adapt to changing needs
Access management must be able to adapt and change, as fast as Clockwise clients’ needs
The office space demands of a start-up, freelance co-worker, or growing SMB can change at any time, so Clockwise offer a range of membership levels and packages. Access management must be able to adapt and change, as fast as Clockwise clients’ needs.
Because tenants come and go frequently, Clockwise facility managers need tailoring of user access rights, to be as easy as possible. Clockwise’s own spaces and a portfolio may also evolve, so any access system must be able to scale instantly up or down. How flexibly Clockwise can deliver for their clients is essential to growing in such a competitive market.
Incedo Business offers versatile access control
The range of Incedo-enabled devices and door hardware, managed by simple cloud-based software, convinced Clockwise to choose ASSA ABLOY Opening Solutions’ Incedo Business, for all their premises. This platform-based access solution connects security software and hardware within a single, future-proofed ecosystem.
The diversity of Incedo-enabled devices enables Clockwise to select the ideal electronic lock for every opening in their properties. Internal private office doors, ‘Zoom rooms’ and meeting rooms, as well as communal area doors, and entrance/exits, are now secured with wireless access control devices from the Incedo Business range.
Flexible system management options
Incedo’s flexible system management options help Clockwise to operate access control with maximum efficiency. Administrators quickly create groups with tailored access for specific doors.
Access permissions may also be time-limited, which is perfect for meeting room bookings or for facilitating access hours for different membership options. Private desk members get 24/7 admission, whereas hot-desk membership is only allowed entry during office hours. According to Clockwise, the flexibility to create groups and the ability to remotely update cards, both work really well for their business.
Abloy UK has been awarded a three-year contract with Thames Water, valued at an estimated ∼750k, to upgrade existing locking systems between now and June 2024.
Thames Water is the UK’s largest water and wastewater company, serving 15 million customers across London and the Thames Valley.
Cylinders and padlocks
Products specified for the project include padlocks and a range of cylinders, which will be used to secure a variety of areas and assets. These include treatment plants and pumping stations on applications such as hatches, doors, and gates. They'll be used at over 22 sites in North and East London including Coppermills and Abbey Mills.
Abloy cylinders combine flexibility with security, to provide unbeatable performance and meet the BS EN 1303 standard for Cylinder Locks. Abloy padlocks use a unique rotating disc principle and are renowned for their endurance and maximum resistance against physical attack, offering durability in even the severest of climatic conditions.
Access control and keyless solution
There is also the future potential to implement a PROTEC2 CLIQ access control system and BEAT keyless solution that combines a digital key, mobile application, and a heavy-duty, Bluetooth padlock, all managed with the visual Abloy OS user interface.
Simon Jeff, Market Developer for Critical Infrastructure at Abloy UK, said, “We are delighted to have secured a contract of this size with such a prominent and well-respected company such as Thames Water, and look forward to successfully implementing the new locking systems over the next three years.”
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges.
We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security.
As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?