Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an...
Suprema, a global provider of access control, time & attendance and biometric solutions, recognized the trend towards contactless, biometric and cellphone credentialing long before the onset of the COVID-19 pandemic. The company's premier biometrics solution, FaceStation 2 Smart Face Recognition Terminal, employs intelligent facial recognition ensuring highly accurate personal identification and authentication for improved overall security with contactless operation. MobileAccess, Suprema's...
SALTO Systems has announced the release of its SALTO contactless smart card NCoders. The SALTO NCoder is for next-generation access control systems and they integrate the encoding capabilities of a powerful updated encoder with a built-in desktop reader function. SALTO NCoder The SALTO NCoder configures permissions and user access plans for user credentials. It is compatible with a wide range of RFID cards and mobile keys and can be used in most commercial markets including hospitality, enabli...
SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has released the SALTO Neo Cylinder, a new electronic cylinder that offers more features and better functionality than any other cylinder on the market. The compact SALTO Neo Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors and more. It’s available in...
The new family of social distancing tools supports the smooth return to a safe shopping environment by providing automated occupancy control, ensuring the number of customers in a physical space never exceeds a maximum limit. With Gunnebo’s OccuLinq software, retail managers enjoy real-time data on customer numbers at their fingertips. When a maximum occupancy level is reached, gates lock temporarily until another customer has left the store, after which a new customer is free to enter. A...
Telaeris, a handheld badge verification and emergency mustering solutions provider for physical access control systems (PACS), has announced its XPressEntry software integration with Maxxess eFusion access control software. XPressEntry - eFusion integration Maxxess access control customers can now use a variety of XPressEntry compatible handheld badge readers to quickly muster employees during an emergency evacuation, verify identity, perform medical screenings at entry points, record entries...
Nortech announced its most advanced NVITE multiple technology reader, designed for contactless identification. The NVITE supports a wide range of credential technologies including QR, Proximity Cards, Smartcards, BLE and NFC, making it an effective access control reader. The NVITE solves one of the major issues in larger sites with multiple facilities and mixed technology credentials, by providing an all-in-one reader solution. It also simplifies the transition from one technology to another without having to replace and re-install the reader. It’s a future-proof technology offering more flexibility, increased convenience, enhanced security identity management, and improved human resource management. Multi-technology reader “The NVITE multi technology reader reads multiple credential technologies, enables contactless identification and includes mobile ID Protocol for implementation with third part Apps. We have already received many enquiries for Nedap’s NVITE, the latest product in their AVI portfolio and are very excited to officially launch the product in the UK,” Stephen Blackler, Managing Director. NVITE offers seamless integration and supports a variety of well-established industry-standard protocols, such as Wiegand, clock & data and serial connections such as RS485. It also supports the Open Supervised Device Protocol (OSDP) for advanced and secure communication between the NVITE reader and the control panel. LED and beeper indication The built-in high intensity red, green and blue LED’s provide the user with visual feedback that the credential has been read or authorized. The LED and beeper functionality can be either controlled by the access control panel or pre-reconfigured. The NVITE reader is ideal for mounting at a height of about 1.5 meters. The reader is IP65 rated, so it can be used outdoors as well as indoors. The reader is fitted with a tamper switch. Secure channel protocol Mobile ID Protocol for implementation with third party Apps. OSDP v2 supported including secure channel protocol. Read range: BLE up to 15 meters (may be restricted by cellphone app). NFC, LF proximity card and smartcard up to 5cm.
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered access to computers’, according to the software’s creators. Eyal Itkin, a Vulnerability Researcher at Check Point, demonstrated that a threat actor with access to a computer inside an organization can execute a Reverse RDP attack, an attack in which a remote PC infected with certain malware takes over a client that tries to connect to it. Reverse RDP attack Once in control of the gateway, an attacker could eavesdrop on all incoming sessions In this case, the Reverse RDP attack would enable a threat actor to take control of the Apache Guacamole gateway that handles all of the remote sessions in a network. Once in control of the gateway, an attacker could eavesdrop on all incoming sessions, record all the login credentials used, and even control other sessions within the organization. Check Point researchers say this foothold is equivalent to gaining full control over the entire organizational network. Check Point researchers classified their findings into two attack vectors: Reverse Attack Scenario: A compromized machine inside the corporate network leverages the incoming benign connection to attack the Apache gateway, aiming to take it over. Malicious Worker Scenario: A rogue employee uses a computer inside the network to leverage his hold on both ends of the connection and take control of the gateway. Data security in remote work operations Omri Herscovici, Vulnerability Research Team Leader at Check Point said, “While the global transition to remote work is a necessity, we cannot neglect the security implications of such remote connections, especially as we enter the post-coronavirus era. This research demonstrates how a quick change in the social landscape directly affects what attackers might focus their efforts on. In this case, it’s remote work.” Omri adds, “The fact that more and more companies have externalised many internally-used services to the outside world opens a number of new potential attack vectors for threat actors. I strongly urge companies and organizations to keep their servers up-to-date to protect their remote workforces.” Check Point Research responsibly disclosed its findings to The Apache Software Foundation (Apache), the maintainers of Guacamole, on March 31, 2020. On May 12, Apache issued 2 CVE-IDs to the 4 reported vulnerabilities, and Apache has released a patched version in June 2020.
ELATEC, a globally renowned manufacturer of innovative multi-frequency RFID readers, will have a new CEO as of July 1, 2020. Robert Helgerth takes over the management of the company and will set the course for the company's growth in the future. In Robert Helgerth, who was most recently responsible for Microsoft's partner business in Asia, ELATEC has gained a visionary manager with great expertize in the strategies, structures and processes of internationally successful corporate management. Enhancing corporate profile The previous CEO, Stefan Haertel, is moving from operational responsibility to a strategic consulting role for product development and acquisitions. Robert Helgerth, who holds a degree in business administration, has written success stories as a managing director of corporations, medium-sized companies and start-ups. A visionary and pragmatist at the same time, Robert Helgerth brings with him an extensive worldwide network through his many years of work in the USA and most recently in China. IT security sector veteran There is hardly any other industry in which you have to be more open to progress and innovation" "There is hardly any other industry in which you have to be more open to progress and innovation. This is why I appreciate the ‘doing’ mentality of medium-sized companies like Elatec: addressing issues, drawing up a joint plan, implementing it decisively and then celebrating success together with our customers," said Robert Helgerth, the new Chief Executive Officer (CEO) of ELATEC GmbH. Robert Helgerth looks back on a successful career in the IT industry, with positions in the management of Microsoft, Compaq Computer GmbH (part of Hewlett Packard (HP) Enterprise), Digital Equipment GmbH and other large IT companies. The starting point of his career was Nixdorf Computer AG. Former Elatec CEO to continue in advisory role The former CEO of ELATEC, Stefan Haertel will remain as a member of the Advisory Board and as the Senior Advisor for Strategy, he will continue to advise the management board on strategic issues. His focus will be on product development, new markets and mergers & acquisitions. "We are very pleased to have found a competent manager in Robert Helgerth, who - with his expertize in the areas of vision, strategy, structure and processes - will steer our company with a sure hand through the new challenges of a changed future," said Stefan Haertel, who will support his successor from his new position with his knowledge and passion for ELATEC.
Camden Door Controls, a globally renowned provider of door activation, control and locking products, is pleased to announce the release of CV-7600 Series Bluetooth-enabled card reader, a mobile-ready reader based on RFID technology that combines Bluetooth Low Energy (BLE) and contactless smart card technologies. CV-7600 Series card reader In operation, the latest CV-7600 Series Bluetooth-enabled card reader is capable of reading data stored on a contactless smartcard credential via high frequency. In addition, it can also read data from a mobile credential stored in a smartphone’s wallet app via BLE technology, without physical contact and then pass the data obtained to the physical access control system. CV-7600 Series Bluetooth-enabled card readers are also compatible with MIFARE prox. cards and fobs. This feature allows system managers the ability to assign the best/preferred type of credential for each system user. Mobile access “The CV-7600 Bluetooth-enabled mobile readers are an ideal choice for access control system users that would prefer to use their smartphone instead of a card or fob credential,” says David Price, Vice President of Communications and Corporate Development at Camden Door Controls. David adds, “We’re proud to add this Bluetooth-enabled reader to our extensive line of indoor and outdoor access control system readers.”
Connect ONE by Connected Technologies presents a new cloud badge printing integration with the InstantCard ID Card Service, allowing dealers to easily expand into offering customized identification badging and credentialing as part of their menu of services while earning additional revenue. API with InstantCard Connected Technologies developed the Application Programming Interface (API) with InstantCard so dealers can use the powerful cloud-hosted Connect ONE security management platform to create customized badge templates for users and their facilities in a wide range of vertical markets. All the latest identification technologies, including barcode, magnetic stripe, smart card, QR and RFID can be created, printed and shipped by InstantCard directly to the dealer’s Connect ONE customer. "This integration checks all the boxes for dealers,” said Dan Simon, Co-Founder and Managing Partner, Connected Technologies. Integration with Connect ONE The integration with Connect ONE allows customers to associate users with a badge template Dan adds, “It gives them the option to offer a convenient service for user badge management while removing the cost and burden of onsite printer maintenance as dealers continue to build additional recurring monthly revenue (RMR) and add value to their business." Once dealers become a dealer/distributor, they can easily create card templates while InstantCard handles printing and shipping badges to customers. The integration with Connect ONE allows customers to associate users with a badge template, automatically supplying the user information and image to the template at InstantCard and then ordering a badge for print online. Mobile Badge with Connect ONE After the badge is ordered, the same template will also become the Mobile Badge with Connect ONE so the user can display it via the Connect ONE app as well as physically in person. Integration into Connect ONE, the platform that allows dealers to view, manage and control all their services to their customers through a single interface, gives dealers the opportunity to add to their offerings and start receiving RMR from both the customer and InstantCard.
Salesforce and Siemens announced a strategic partnership to develop a new workplace technology suite that will support businesses globally to safely reopen and deliver the future experience for physical workplaces. The partnership will combine Salesforce’s Work.com, powered by Customer 360, and Siemens’ Smart Infrastructure solutions, including Comfy and Enlighted, to orchestrate the processes, people and things that are essential to creating safe, connected workplaces for the future. Key solutions include a ‘touchless office’ with mobile employee boarding passes for building and elevator entry, and a safe occupancy management system, which allows employees to reserve conference rooms and desks through Comfy’s app that sends real-time alerts as thresholds are reached. Accurate emergency response Additionally, by leveraging occupancy and location data provided by Enlighted and aggregated within Comfy, including employee check-in and desk and room reservations, businesses will be able to augment their manual contact tracing in Work.com. This will allow for a faster and more accurate emergency response. Contact tracing will be an opt-in solution to respect users’ privacy. Siemens and Salesforce will be the first to deploy the new solutions in their own offices Combining best-in-class IoT technology from Siemens with Salesforce’s Work.com solutions will enable customers to make data-driven decisions based on real-time data and create a flexible framework for the future workplace experience. Siemens and Salesforce will be the first to deploy the new solutions in their own offices, including Siemens Smart Infrastructure headquarters in Zug, Switzerland, and Salesforce Tower in San Francisco. Smart infrastructure solutions “The safe return of people to the workplace is a global challenge, and it’s vital that companies protect their employees to build trust and confidence,” said Roland Busch, Deputy CEO and member of the managing board of Siemens AG. “Together with Salesforce we can swiftly support businesses around the world to implement technology which supports employees as they return to the office, while laying the foundations of long-term digital transformation in workplaces.” “Organizations worldwide are beginning to reimagine the future workplace experience, putting their employees’ health and safety at the center of their digital transformations,” said Alex Dayon, President and Chief Strategy Officer, Salesforce. “By combining Siemens’ Smart Infrastructure solutions with Salesforce’s Work.com, we are giving companies the tools to make smart, data-driven decisions quickly and the confidence to reopen safely.” Cloud-connected smart sensors Siemens plans to contribute technology from its Smart Infrastructure portfolio, including IoT solutions company Enlighted and workplace experience solution Comfy. Data is collected multiple times per second by cloud-connected smart sensors from Enlighted. Enlighted’s Building IoT platform creates ‘sensory systems’ throughout the building, giving real-time insight and analytics into how the building is used, and providing occupancy and location services for people and assets. Employees are able to view and reserve desks and meeting rooms that adhere to distancing guidelines in real time Comfy’s Safe Workplace Solution features an employee-facing app which enables businesses to keep people informed and productive, while providing a workspace that is safe and compliant with local regulations. Employees are able to view and reserve desks and meeting rooms that adhere to distancing guidelines in real time, search for and navigate to health and safety amenities and request services such as sanitisation. Risk management plans In addition, Comfy Insights offers businesses an analytics dashboard to better understand how offices are being used, informing a smarter, data-driven strategy for future workplaces. Salesforce’s Work.com, powered by Customer 360, is an all-new suite of applications and advisory resources to help business and community leaders around the world reopen safely. Work.com’s essentials solutions – including Workplace Command Center, Contact Tracing, Emergency Response Management and Rapid Crisis Response – empower customers to make data-driven decisions, build business continuity and risk management plans, and communicate effectively with stakeholders at scale.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls? For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions. “There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.” Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”. Challenge 1: Ensuring building readiness After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped. Challenge 2: workforce management There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office. Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns. Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation. Challenge 3: Controlling access The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions: Where have you visited in the days since last entering the workplace? Have you come into contact with anyone else who has recently visited high-risk areas? Have you shown any symptoms of infection in the past xx number of days? Policies should be implemented that require employees to be screened regularly — and for an extended amount of time If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organizations— often multiple times a day. This applies to interactions at delivery bays, too. A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity. Challenge 4: Social distancing and contact tracing plan Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only. Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies. Challenge 5: Reduced physical touchpoints Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access. Challenge 6: Communicating for confidence Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no longer an option. Instead, a single, all-encompassing security platform should deliver connectivity, convenience and simplicity, keeping one’s premises secure and filtering access to manage the ever-changing movement of people. This is where Incedo Business comes in: a new solution for all types of premises, handling security while leaving one free to focus on growing the business. Incedo ensures employees, customers and goods are where they need to be. Incedo makes life and tasks easier and more efficient for everyone, from installers to end users. Facility managers enjoy more control and flexibility than they ever thought possible, maximizing return on investment, with Incedo Business able to scale quickly when needed. System administrators can do more within available budgets: initiating, cancelling or amending access profiles, and monitoring movement around their site in real time. Building users, meanwhile, get the individual access times and entry permissions they need. They can move freely without compromising the security of other people and equipment. Integrators can upgrade connected technologies and systems quickly, minimizing risk and meeting customers’ raised expectations of modern technology. Installers no longer need to wrestle with incompatible systems: easy interoperability is built into Incedo, meaning no more delays or unnecessary complexity. With Incedo’s modular platform approach, one simply chooses the security hardware and credentials one needs and the appropriate management system option. One can set exactly who can access which doors, and when, from the user-friendly Incedo Business software interface. When Incedo Business launches, one can pick the most suitable options from a growing range of Incedo-enabled security and access control hardware. Road-tested, award-winning ASSA ABLOY wireless digital locks and wired ASSA ABLOY wall readers secure all interior and exterior doors. Also already available, a choice of card and token credentials helps users enjoy safe and convenient access to, and movement around, the premises. Incedo mobile keys add the flexibility to open doors with a smartphone. Incedo’s system management options, Lite, Plus and Cloud, scale from entry level up to cloud-based administration. One can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand, or switch system management options, all within a single environment. Migration between Lite, Plus and Cloud options is always seamless in any direction, ensuring total flexibility for the business. Incedo moves with you, today and in the future However your business moves, an Incedo system moves along. Having a flexible platform, able to adapt as the organization changes, reduces total cost of ownership: one never needs to retrain staff or start over from scratch. New Incedo-enabled hardware from ASSA ABLOY and third-party providers will continue to be connected to, and made available within, the evolving Incedo platform. One picks the hardware and software configuration one wants, and can change one’s mind as often as one likes. Incedo guarantees flexibility and scalability in every way, to meet the security needs today and in the future. And because the security and operational challenges at a university, small hotel or hospital are not the same as those faced by a public building or corporate HQ, the Incedo ecosystem will introduce new, advanced user interfaces for the specific industry. “Incedo Business transforms the experience of using and managing a building. It is also the seed from which our revolutionary Incedo ecosystem will grow in the months and years ahead,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “A future where doors are smarter, connectivity and movement are seamless, and access management is genuinely intelligent. This is our vision for Incedo and for those who will be using it.” Incedo™ Business embodies ASSA ABLOY’s vision to create a safer and more open world, keeping everyone on the move. Together. To learn more and download a free solution guide, visit https://campaigns.assaabloyopeningsolutions.eu/Incedo-business
A landmark building located on the north side of the River Thames, has seen its security upgraded with Smart R Distribution and systems integrator, Isecurity Systems Limited, working in partnership to ensure tenants are protected by the latest advances in Access Control technology. The Northern & Shell Building at 10 Lower Thames Street, London EC3 which offers dramatic panoramic river views, has an on-site restaurant, a 10 storey glazed atrium and glass wall climber lifts. Among its tenants, Northern & Shell Group occupies approximately 110,000 sq. ft. spread over the ground, 4th, 9th and 10th floors. Single software platform As part of a phased office refurbishment program, the owners of the building reviewed the tools available to the security personnel to enable them to maintain a safe and secure environment for approximately 5,000 people who work in the building, as well as contractors and visitors. “The existing Geoffrey Access Control system had been in use for over 20 years and although it was still operating effectively, its functionality was limited compared to more modern solutions,” said Russell Morgan, Project Manager for Elsenham, Essex based Isecurity Systems, who have had a long term association with Northern & Shell Group. “A decision was made to invest in the latest generation Vanderbilt Security Management System (SMS) which enables users to efficiently manage alarms, lifts, visitors and the photo ID badging process, from a single software platform.” Magnetic stripe readers The Comelit video entry system integrates seamlessly with the SMS control system Russell and his colleagues at Isecurity Systems worked with the Smart R Distribution team to supply a Vanderbilt SMS access control system and they also in the process of replacing the 140 aging magnetic stripe readers with new CIDRON access control readers which support securely encrypted DESfire EV2 contactless Smart Cards from Cambridge UK based Authenticard. Smart R Distribution also supplied a new Comelit ViP video entry system, comprising 8 door stations and 2 control desk positions, which has been installed by Isecurity Systems to allow operators within the building’s 24/7 control room, to communicate and remotely open doors for contractors and couriers who need to gain entry via, for example, to a basement entrance. The Comelit video entry system integrates seamlessly with the SMS control system. Efficient access control solution “We now have a highly efficient Access Control solution which helps us to manage the smooth movement of large numbers of people through turnstile controlled speed lanes located in our reception area and it also enables us to control who can gain access to other restricted areas within the building,” said Dave Wratten, Facilities Manager for Northern & Shell Group. “Isecurity Systems and Smart R should be applauded for working in partnership to ensure that all the equipment was delivered to site exactly when it was needed and then installed to our complete satisfaction.”
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Eagle Eye Networks, the provider of cloud video surveillance, announces one of the fastest completions of a large scale, fully integrated citywide surveillance program, installing 13,720 cameras in 4 months. This project has been a large success for Mexico City C5, contributing to Mexico City's larger ‘Citizen Safety’ mobile application. This mobile application facilitates content sharing for more effective neighborhood watch and a panic SOS button. “Effective citywide surveillance is more than installing cameras in a few key locations, it’s about creating a platform that meets the unique needs of each municipality.” Unique web application The cameras are all operational, remotely monitored, and providing safety and security to citizens today “In partnership with Eagle Eye Networks we leveraged the Eagle Eye Video API and SDK to customize a unique web application that is designed to integrate fixed, mobile body worn, and vehicle cameras into one interface, providing an unprecedented level of insight and awareness into our cities operations, ” said Jaime Abad Valdenebro, CEO, Omnicloud.mx. 4G connectivity with Eagle Eye Networks’ bandwidth optimization was utilized in order to facilitate this quick deployment, installing approximately 250 cameras per day at its peak. The cameras are all operational, remotely monitored, and providing safety and security to citizens today. Integration of new technologies This fast-paced install occurred amidst the global supply chain challenges caused by COVID-19, however, Eagle Eye Networks’ strong partnership with both the Reseller, Omnicloud.mx, and suppliers provided alternatives and solutions to keep the project on schedule. Eagle Eye Networks solution was chosen because the Eagle Eye Cloud Video API Platform provides an open solution that allows integration of new technologies (AI, advanced analytics, search, license plate recognition), new suppliers, and new cameras at any time. Future and cybersecurity proofing the city’s investment and eliminating the headaches associated with managing large premise based data centers was crucial in their decision. City-Wide surveillance project Eagle Eye’s cloud video retention and massive on demand scalability make it ideal for large scale deployments" “When deploying a city-wide surveillance project, scalability, retention, and cellular transmission must be considered. Eagle Eye’s cloud video retention and massive on demand scalability make it ideal for large scale deployments. To operate your own large data center system for video recording is expensive and challenging.” “With Eagle Eye’s subscription service we provide a more robust and lower cost answer for large scale deployments. Furthermore, our open platform provides a future proof solution, integrating AI, video analytics, and advanced search at the click of a mouse,” said Dean Drako, CEO of Eagle Eye Networks. Cost-Effective solution “More than half of the world’s population resides in cities, creating an increased demand for smart, accurate insights to help streamline everyday operations including public safety, traffic flow management, infrastructure and transportation. Enormous amounts of data collection, aggregation, and storage are necessary to drive the deep analysis that is required to produce these smart insights.” “The only way to efficiently manage this data is to aggregate and analyze in the cloud,” said Jeff Kessler, Managing Director of Imperial Capital and Publisher of the Security Industry Annual Report. The Eagle Eye Cloud is a robust, scalable and cost-effective solution, purpose-built to support the data storage and analysis demands that city-wide deployments require.
International medical imaging IT and cybersecurity company Sectra (STO: SECT B) is receiving new orders for its crypto solutions for cellphone telephony, smartphones and the blue-light operations’ communication network TETRA from several European government authorities. Order bookings for Sectra’s Secure Communications operating area amounted to approximately SEK 35 million in April 2020. With solutions from Sectra, authorities that handle sensitive information are able to maintain their operations even when faced with exceptional circumstances.“Communication is pivotal for an operation in times of crisis. If information is unreliable, it is impossible to lead the operation,” says a spokesperson for a European security authority. cellphone encryption solutions During the COVID-19 pandemic, many operations are being run from the employees’ home offices During the COVID-19 pandemic, many operations are being run from the employees’ home offices. Currently, opportunities to work remotely are extensive in many work categories, but for individuals who are privy to classified information, working from home is not always an option. This means that certain critical operations risk coming to a standstill if employees are unable to meet each other or access their usual working tools. To uphold operations, many European government authorities have now implemented cellphone encryption solutions from Sectra. Measures taken include providing their key employees with smartphones and tablets that are protected with Sectra’s crypto solution. With these tools, they are able to exchange information in encrypted calls and chat, as well as gain access to important applications like email and calendar via a secure connection. Maintaining security and integrity Without such a solution, classified information belonging to the authorities cannot be exchanged at all outside of the walls of their official facilities. Other authorities that are closer to the field are taking advantage of Sectra’s crypto technology for the TETRA network. The TETRA network is used by blue-light operations and other emergency services and is usually operational on a national level. One country in Europe has elected to expand its access to Sectra’s crypto solution to ensure that, for example, healthcare professionals are able to discuss sensitive information while maintaining security and integrity for both healthcare services and the individual.
Comelit has continued its work with multi award-winning London property developer, Howarth Homes to present new homeowners at office-to-residential conversion, Lovell House with smart access control and door entry. Lovell House, located off Uxbridge High Street in Middlesex is a stunning collection of 45 executive suites, one and two bedroom apartments set over six floors, each finished to a high specification. Smart access control and door entry system Each apartment has been individually planned to ensure a light and airy interior with excellent accommodation flow. Within the initial design process, Comelit was invited back to work with Howarth Homes to accommodate a request for smart security right from the point of entry to individual apartment access. Linzie Howland, Sales Director of Howarth Homes stated, “Howarth Homes is adept at creating affordable option developments interiors that demand more than just cursory attention. Every detail in each of our developments has been carefully and thoughtfully considered to ensure that our new home promises easy, hassle-free living”. SimpleKey access control solution Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets Linzie adds, “Lovell House is testament to this commitment, and commands superior specification right from access control through to door entry. We have gone above and beyond the expected to ensure homeowners can take advantage of purchasing offers and live in a development where we present smart security and visitor management without compromising aesthetics.” Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets in every apartment, allowing visual door entry operating through its 2-Wire SimpleBus solution. The powerful combination presents homeowners with the capability to answer access requests and manage home access. Comelit access control readers installed Each of the five floors has an access control reader installed alongside each lift facility, totaling 19 units around the site. The development itself is finished with a bespoke stainless steel panel with bezel design. All systems have been designed and installed to comply to Secured by Design standards. Tom Kidston of Excellence Electrical said, “Howarth Homes prides itself on its pledge for connected living for a connected world, so it’s essential access control and door entry is planned into the specification and design”. Residential security systems Tom added, “This is especially important at office to residential conversion works such as Lovell House, where systems need to be considered with the change of purpose to the building. Early planning ensures a coordinated approach to installation, with minimal cabling requirements to remain compliant, stylish and secure.” Daniel (Dan) Wood, Southern Sales Manager at Comelit UK said “Uxbridge is increasingly growing in demand for first time buyers and rental property, experiencing excellent capital growth. Howarth Homes has a number of developments in the area and we have been thrilled to work closely with them to deliver total solutions for access control and door entry”. Dan adds, “At Lovell House, the specification brief was to create futureproof, smart security and visual visitor management, delivered seamlessly with our SimpleBus and SimpleKey systems.”
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload