Ping Identity, the pioneer in Identity Defined Security, announced a significant update to PingOne for Customers, the cloud-delivered Identity-as-a-Service (IDaaS) offering built for developers. The API-first solution can now deliver seamless and secure push notifications from custom mobile applications that can be used for passwordless and advanced multi-factor authentication. The cloud identity solution helps development teams speed time to launch their applications, while also taking securit...
Johnson Controls introduces exacqVision VMS v19.06, with updates that include automatic transfer of video after a server failover, a new access control integration, support for ONVIF network loss recording, improved motion zone configuration and enhanced network security for mobile app users. exacqVision VMS v19.06 The latest version of exacqVision offers Enterprise Manager customers a more robust failover solution. In a failover scenario, transferring recordings from a spare NVR to the primar...
The winning products and services of the 2019 Innovation Awards were revealed at ESX 2019 on June 4 in Indianapolis. Each year, the ESX Innovation Awards program recognizes outstanding products and services that drive the electronic security and life safety industry forward. This year’s winners continue that legacy with novel innovations and improvements. To determine the best of the best, judges selected winners from a pool of applications from manufacturers and service providers servin...
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with...
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
PSA, the security and systems integrator consortium, announces the call for presentations for PSA TEC 2020 is open. Sessions will be selected that serve a variety of disciplines and focus on emerging technologies, critical issues in the industry and tool development to augment attendees’ knowledge base needed to drive the industry forward. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets. TEC features education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. Professional systems integrators This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization. TEC 2020 will be held at the Sheraton Downtown Denver in Denver, CO on April 20-23, 2020. PSA is accepting submissions to complete the education program with content that provides knowledge PSA is accepting submissions to complete the education program with content that provides knowledge for professional systems integrators in the physical security and pro-AV markets or sessions that will help advance their personal skillsets within their professional disciplines. Topics represented at TEC include cybersecurity, leadership/management, managed services, marketing, operations, procurement, sales and technical. General education sessions Proposals are welcome for both certification programs and general education sessions for the security and pro-AV markets. All sessions must be unbiased with no brand or product emphasis and minimize commercial references and overt branding. Submissions are evaluated based on topic relevance, speaker expertise and originality of the content. Additional guidelines are provided in the call for presentations submission process. Accepted and approved presenters will receive complimentary registration to TEC 2020 and will have the opportunity to solidify their reputation as an industry resource and subject matter expert while expanding their own professional network and gaining access to strategic partnerships. PSA does not pay honoraria or expenses for accepted proposals.
Pulse Secure, the provider of software-defined secure access solutions, is pleased to announce new partnerships with Westcon EMEA, Nuvias Group and Spectrum Networks, to deliver Pulse Secure authorized training courses to its reseller partners and customers across EMEA. Following on from the successful North American launch of the authorized education training course curriculum earlier in the year, the Pulse Secure training and certification program has authorized new partnerships to prepare customers and reseller partners for the Pulse Secure certified technical expert certification exams in the following countries: United Kingdom, France, Sweden, Germany, Belgium, Netherlands, Italy, Spain, Portugal, United Arab Emirates and Saudi Arabia. Secure access solutions Pulse Secure has always made its training towards certification available virtually" “Pulse Secure has always made its training towards certification available virtually,” said Sudhakar Ramakrishna, CEO of Pulse Secure. “Now by expanding our authorized education partnership base of providers, we can fulfill our business objective of delivering secure access solutions for people, devices, things and services by offering instructor-led, in-person, hands-on training in local languages.” “As a technology training organization, we have always focused on imparting the right skills needed for the successful implementation of products and solutions in the vendor, partner, customer ecosystem. We are excited to collaborate with Pulse Secure to add value in this space,” added Sanjeev Singh, MD of Spectrum Networks DMCC. Training and education “Now is a great time for partners to join the Pulse Secure access now partner program, and we’re delighted to be selected as an ATC partner. This will help our partners gain extra knowledge, helping them differentiate in the marketplace and grow their business. Now is a great time for partners to join the Pulse Secure access now partner program" "Adding training services to our deep knowledge of Pulse Secure solutions means partners can invest in a relationship that will pay dividends in the long-term. As with all our training and education, our goal is to increase partner profitability and the value they bring to their customers – all from a single, trusted source,” said Sam Paris, VP EMEA of Services and Renewals Westcon at Comstor. Implementation consultants The Pulse Secure training and certification program includes training courses designed to help network engineers, enterprise system architects, technical support specialists and implementation consultants to successfully deploy and maintain Pulse Secure products and services. After completing the training course, participants are prepared to take the Pulse Secure certified technical expert exams. Local classes will begin in June 2019 and will include training for: Pulse Policy Secure (PPS) - deployment, implementation and configuration; Pulse Connect Secure (PCS) - administration and configuration; and Pulse Secure vADC - administration and configuration.
Check Point has announced a new suite of network security products for large enterprises and data centers, which deliver an industry-leading Tera-bps (bits per second) of Gen V Threat Prevention without compromising on network performance, up time, or scalability. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award-winning SandBlast Zero-Day Protection. These modular gateways come in base, plus and turbo models delivering up to 24 Gbps of Gen V Threat Prevention security throughput, support connectivity standards up to 100 Gbe, and feature expansion options for up to 64 network interfaces. “Gen V (5th Generation) cyber-attacks have impacted two billion consumers and 46% of enterprises globally, yet most organizations are still deploying 2nd and 3rd generation security,” said Gil Shwed, CEO and Founder of Check Point Software. “Our new gateways – in tandem with the Maestro Orchestrator security solution – will allow our large enterprise customers to achieve unprecedented levels of Gen V security at industry leading inspection rates.” prevention against advanced threats R80.30 Gen V Threat Prevention protects users from malicious web downloads in real-timeThe newest release of Check Point’s R80.30 software features the industry’s first threat extraction for the web and patent-pending TLS/SSL inspection capabilities, providing practical prevention against advanced threats. With R80.30, admins will no longer have to compromise on security for productivity. R80.30 Gen V Threat Prevention protects users from malicious web downloads in real-time. Threat Extraction removes exploitable content, reconstructs files to eliminate potential threats and promptly delivers the clean content to the user. In addition, a Threat Prevention dashboard provides full visibility across networks, mobile and endpoints. The recent release of R80.30 includes new patent-pending Transport Layer Security (TLS) technologies that provide state-of-the-art SSL Inspection. This technology enables enterprises to quickly inspect SSL-encrypted network traffic, evade cyber-attack techniques like Server Name Indication (SNI) manipulation, and strike the right balance between security and privacy. Up to 90% of all web traffic is encrypted, meaning that SSL inspection capability is essential for detecting threats that would be otherwise hidden. Advanced security management software R80 is the industry’s most advanced threat prevention and security management software for the data center, cloud, mobileWith over 160 technology integrations and 100 new features, R80 is the industry’s most advanced threat prevention and security management software for the data center, cloud, mobile and endpoint. R80.30’s innovations enable the new 16000 and 26000 gateways to achieve industry leading Threat Prevention performance while streamlining the management process through a single console. Check Point Maestro Hyperscale Orchestrator, the industry’s first hyperscale network security solution, enables a single Check Point gateway to expand to the capacity and performance of 52 gateways in minutes. This nearly limitless scalability enables cloud-level resilience and reliability along with Terabit/second firewall throughput, allowing organizations to support 5G network high data rates and ultra-low latency while securing the most demanding network computing workloads. This combination of the R80.30 software, 16000/26000 Security Gateways, and the Maestro Orchestrator enables Check Point customers to achieve hyperscale network security with tera-bit levels of threat prevention performance.
Ping Identity, global provider of identity-defined security solutions, has announced its capabilities framework and practical guidance for adopting a Zero Trust security strategy. This framework provides reliable direction to companies in any stage of the Zero Trust maturity process to help enable a broad range of use cases and technology integrations. It also includes innovative ways to support secure access to anything, by anyone, from anywhere on any device. Zero Trust security strategy The Ping Identity model provides numerous starting points for architecting Zero Trust security within the realms of strong authentication, endpoint security, network security, workload security, data security and transaction security. In addition, Ping offers guidance ranging from advising security leaders on the transition process to Zero Trust, to providing security practitioners paths to configure key Zero Trust elements, starting with strong identification and authentication. Ping has established multiple partnerships to support its Zero Trust framework In fact, Ping has established multiple partnerships to support its Zero Trust framework and continues to develop this network of technology partners to serve the security needs of enterprise digital transformation projects, such as multi-cloud deployments, secure partner access and API first initiatives. Some of the companies that Ping Identity has partnered with to establish Zero Trust include ID DataWeb, iovation, a TransUnion company, and MobileIron: “Zero Trust is all about verifying that your users are who they say they are – both upfront, and on an ongoing basis,” says Matt Cochran, VP of product & operations for ID DataWeb. “The key to adoption is taking an approach that does not sacrifice user experience by finding the right balance of strong upfront identity verification, passive environmental risk analysis and adaptive MFA challenges. Ping Identity and ID DataWeb’s combined solution allows companies to establish a strong Zero Trust foundation on top of their existing identity investments, which is key for success.” When done right, Zero Trust security can minimize both risk and friction for good customers, and that’s just what the partnership between Ping Identity and iovation accomplishes,” said Jon Karl, EVP of corporate development and co-founder at iovation. “Our joint customers have the ability to leverage thousands of attributes to accurately recognize devices and assess their trustworthiness while also watching for mismatches and high-risk activity from specific time zones, regions and IP addresses.” “Our partnership with Ping Identity allows us to augment the single-sign on experience in a mobile-friendly way that brings Zero Trust security to all devices,” said Brian Foster, SVP of product management, MobileIron. “This mitigates the risk of corporate resources being accessed from mobile and desktop devices and ensures that all devices, applications, users and networks meet compliance requirements through zero trust principles." Adopting digital transformation initiatives The company recognizes that organizations embarking on digital transformation initiatives are in various stages of Zero Trust maturity. This means providing different types of secure access, each of which has a distinct set of security requirements. To learn more about the Ping Identity Zero Trust framework, listen in to several upcoming webinars and recordings: The recording of ‘How to Broaden Enterprise Security with Zero Trust Access’ shares how Zero Trust adoption can benefit security and business leaders, while providing an overview of common challenges and where to get started on a Zero Trust journey. The recording of ‘Zero Trust and Building Identity for an Open Perimeter at Netflix’ provides a concrete example and discussion of how a cloud-first company has applied principles from the Ping Identity Zero Trust model toward making identity the new security perimeter. The recording of ‘How to Architect API Security for Zero Trust’ offers deep guidance on common API vulnerabilities and ways a Zero Trust approach can fill the gaps. The June 11 webinar ‘CIAM Assessments, Blueprints and Roadmaps for Zero Trust Security’ will explore the role of identity in Zero Trust deployments and how an assessment can help enterprises understand which capabilities are required to enable secure employee, partner and customer access.
Johnson Controls releases the newest version of Tyco Kantech EntraPass security management software, enabling new functionalities such as expanded audit features and other enhancements for a more streamlined experience for users. For faster auditing and troubleshooting, EntraPass v8.10 users can run audit reports based on cards, components and operators, including a detailed report of who made changes to a card or component and when the changes were made. Seamless operation This will help to satisfy corporate and regulatory requirements. Cardholder information fields have been expanded to include at least 20 editable fields (Corporate Edition), including a Unique ID for improved export/import. Additionally, advancements in backup options in this latest version are designed to prevent any version conflicts or errors in the backup process for seamless operation. Information at the user level is also easier to access and verify. Administrators can now easily see the most recent door, card or event access messages by cardholder, see when the cardholder’s secondary access level has expired and go paperless by saving access levels and links directly as a PDF. EntraPass also adds support for up to eight ASSA ABLOY wireless locks through the KT-1 door controller, reducing installation costs and is compatible with Windows Server 2019 Datacenter.
ELATEC is pleased to announce its recent hire of Ron J. Fiedler, who joins the ELATEC team as Vice President of Strategic Alliances. In this role, Fiedler will expand ELATEC’s global presence through business development, strategic partnerships, and penetration of new markets. ELATEC RFID readers ELATEC designs and manufactures unique radio frequency identification (RFID) readers for user authentication and access control applications. ELATEC readers recognize and decode over 60 RFID transponder technologies and are certified for use in as many as 110 countries worldwide. The readers are widely used for secure printing and other applications such as industrial vending, fleet management, time and attendance and single sign-on for computers and other devices. ELATEC designs and manufactures unique radio frequency identification (RFID) readers for access control applications "I was attracted by the company’s international footprint and exceptional 30% year-over-year growth in sales,” Fiedler said. “Most importantly, the demand is growing for RFID card and mobile ID convenience, efficiency and security, which ELATEC’s superior technology is uniquely positioned to capitalize on." RFID technology and security expert Fiedler is a Security industry veteran of nearly 20 years and a subject matter expert on RF credentials. He comes to ELATEC from RF IDeas, Inc, where for the past 15 years he served as Director of Business Development. There, he was instrumental in growing the organization from a start-up to an Inc. 500 ‘5000 fastest growing private company’ to eventual acquisition by Roper Technologies. “We’re very pleased that Ron has joined ELATEC to lead the establishment of strategic industry alliances across our many industries and markets,” said Stefan Haertel, CEO of ELATEC. “As we enter our next phase of growth, Ron’s knowledge, experience, long list of achievements and the respect he’s garnered over his career in the industry will be valued additions to our team—and to our customers as ELATEC technology brings added value like no other.”
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-Expanding Edge Devices Market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud Computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge Computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralized cloud computing and even coins the phrase, “Cloud computing, decentralized” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost Efficiency Of Edge Processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilizing edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilizing edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Among the cloud’s many impacts on the physical security market is a democratization of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile Access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organizations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
The Emerging Technology Zone (ETZ) at ISC West welcomes new startups to the security industry; a requirement for exhibitors is that they have been in business for five years or less. This year, the ETZ will be in the Venetian Ballroom, a new section at ISC West 2019, incorporating companies that were previously featured in the “Global Expo” area along with mid-sized domestic companies and the return of the successful Emerging Technology Zone section. Now located in the Venetian Ballroom adjacent to the Sands Convention Center, this group of exhibitors will also have three large entrances of their own. Latest Technology Companies The ETZ will be a draw in and of itself and will do better for us than being on the main show floor" “The Emerging Technology Zone is a place for attendees to see the latest technology companies all in one place, rather than searching out individual companies all over the main show floor,” says Tom Buckley, Vice President, Sales and Marketing, for Qumulex, a 2019 exhibitor in the Emerging Technology Zone (ETZ). “The ETZ was an easy choice for us and is, in fact, the deciding factor in our taking a booth,” says Buckley. “As a technology startup, we wanted to be located with the other new companies. The ETZ will be a draw in and of itself and will do better for us than being on the main show floor.” Consistent Customer Lifetime Qumulex (Booth 40932) was formed in late 2018 by the founders of Exacq and Infinias. The new mobile-first, unified video surveillance and access control platform enables security integrators to increase recurring revenue and achieve consistent customer lifetime value, says Buckley. ”We are launching in the fall of 2019 but are exhibiting at ISC West due to early interest from security integrators wanting an early preview of what is coming.” Also among the 40 or so exhibitors in the Emerging Technology Zone will be a range of new technologies, from artificial intelligence (AI) to cloud solutions to wearables to lighting solutions and more. Video Analytics Platform Simple, intuitive situational awareness platform that gives first responders a tactical advantage Another ETZ exhibitor is ZeroEyes (Booth 40821), an intelligent video analytics platform, powered by AI, to detect weapons and recognize faces in real time. The company’s goal is to provide school administrators and decision-makers with a simple, intuitive situational awareness platform that gives first responders a tactical advantage. The company was founded by five former Navy SEALS with a combined 50 years of combat experience. “Our platform is being developed right now and has hit an inflection point where artificial intelligence and graphics processors are both capable enough and cost effective,” says Mike Lahiff, ZeroEyes CEO. “This technology is just at the point where it is ready for a wider release and not just for early adopters.” The company will be doing live demonstrations of the product in real time. “It is one thing to tell everyone our capabilities, but it is much more powerful to show our capabilities,” says Rob Huberty, ZeroEyes COO. “We will have cameras set up that are typical of school security systems. These cameras will be linked to the best available hardware on the market. We will showcase our software as it will actually be used in practice.” Companies At ETZ Last year’s Emerging Technology Zone, located downstairs on the lower level of the Sands Convention Center, had a lot of foot traffic and created positive feedback. Some of last year’s Emerging Technology Zone companies are exhibiting in the main exhibit hall this year, emphasising its role as a ‘stepping stone’ as new companies enter the market and then achieve critical mass. This year’s ETZ exhibitors will be looking for a similar level of results from the show. Our expectation is to demonstrate the huge value proposition in proactive security solutions in schools" “We will quantify our success at ISC West in the number of partners and integrators that decide they cannot live without our product,” says Lahiff. “Our expectation is to demonstrate the huge value proposition in proactive security solutions in schools. We want to have partners after the show ready to install our product.” Pre-show preparation will help ensure success. “We are inviting prospects and arranging demos ahead of time,” says Buckley of Qumulex. “Success at any trade show starts before the show. We’re fairly certain about the turnout we will get and the level of interest that integrators will have. We are sending out invites to several thousand security integrators to gain early interest. We also have a suite off the show floor for more in-depth demos.” Affordable Solutions The Emerging Technology Zone, along with the other exhibitors in the Venetian Ballroom, will be among the must-see highlights of ISC West. “Attendees will get to see the future in security,” says Huberty. “They will see actual solutions that are affordable and make sense. These solutions will have a clear value proposition.”
People’s Choice Credit Union is one of Australia’s largest Credit Unions, with 365,000 members and 44 locations across South Australia, Northern Territory, Victoria, Western Australia, and Australian Capital Territory. People’s Choice Credit Union (People’s Choice) has earned a reputation as a forward-thinking and highly innovative company that is radically changing the banking experience for its members and employees. From their head-office to their branches throughout Australia, People’s Choice is utilizing new technology to improve service to members, be more efficient, reduce costs, and decrease their environmental footprint. Smarter workspaces Operating an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks, People’s Choice staff are not allocated a specific desk but instead choose where they wish to sit each day. They can even choose whether they wish to sit or stand, by having desks that can be raised or lowered to suit personal preference. Flexible work environments are proving popular for large corporate companies due to the ability to increase company-wide communication, support project work, improve productivity, reduce clutter, and save costs. “With a large staff, there is always a number of people out of the office, whether it’s on sick or annual leave, or working on business outside of the office.” said Mike Humphrey, Manager of Property Services at People’s Choice Credit Union. “By implementing a flexible workspace model, we have been able to save approximately 3,000 square meters of office space which equates to thousands of dollars each year in building costs” said Mike. Multi-technology smartcard T20 and T10 readers Using Gallagher’s smartcard T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker To facilitate the operation of a flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), People’s Choice uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, People’s Choice has a simple to operate, customizable system that enables staff to carry just one card on site. “We’re all about putting people first. As an organization we’re not afraid to try new ways of doing things, and as a result we’re seeing significant improvements for our members and staff.” Mike Humphrey, Manager of Property Services, People’s Choice Credit Union. Command Center Mobile App Utilizing Gallagher’s innovative Command Center Mobile App, key facilities management personnel are able to manage access remotely using their mobile phone. “Occasionally staff forget their access card and I’ll get a phone call to open their locker for them. Being able to access the platform and administer overrides using my phone, from wherever I am at the time, is huge for me” said Mike “and it speeds things up considerably for the employee”. With people working in different areas at different times, People’s Choice needed a printing solution that simply and easily enabled staff to retrieve printed documents from the nearest printer. People’s Choice was also looking for a solution that helped to cut down on unnecessary waste. Follow-Me Printing solution To meet both of these needs, People’s Choice installed Follow-Me Printing. This printing solution stores print jobs electronically until a user badges their Gallagher access card at a printer to retrieve their files. At this point, the user can terminate any print jobs they no longer need, cutting down on waste. The solution further reduces waste through a configuration that deletes any printing jobs that haven’t been actioned within a 24 hour period. “One of the truly efficient things about our set-up is that our printing integrates with our access control solution.” said Mike. “It means that staff only have one card for all of their access needs on site; they can access the various office floors, lockers, and printers all with a single card, instead of also having keys and pin numbers to manage.” Temperature management solution Any change in temperature beyond the set limits, triggers an alarm notification Through a Gallagher Bacnet integration, People’s Choice has implemented an automated, continuous temperature management solution for the large data center located at their head office. With temperature sensors communicating directly with Command Center, any change in temperature beyond the set limits, triggers an alarm notification to be sent directly to Mike’s phone. According to Mike “The capability for Gallagher’s platform to send critical information, like the potential overheating of a server room, straight to my phone was a big selling point for us. It provides a simple mobile solution to mitigate a considerable business risk.” Visitor management To support efficiency at their head office reception area, People’s Choice chose Gallagher’s Visitor Management Client and Self-Registration Kiosk. The self-registration kiosk serves as an ideal “extra lane” during particularly busy periods, ensuring that visitors are able to register their arrival quickly and effortlessly without delay. The integration between Gallagher’s visitor management solution and Command Center, ensures that a comprehensive audit trail of all visitor management events, including visitor pre-registration, escort, host, and visitor actions, is securely stored and can be easily retrieved to produce reports.
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognized by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centers. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
Two years ago, LABS opened up its new co-working facilities in Camden Market and has a number of locations centered around this iconic area of London. LABS isn’t just popping up in random locations but creating a co-working ecosystem of interconnected buildings and communities. Many companies who hire space are high tech, therefore they expect the facilities they work in to include the latest technology. The challenge LABS faced when developing a co-working environment was to offer a safe and secure working environment that is easy to use by both the clients and staff and uses the latest technology features and provides flexibility and future proofing. Gallagher Command Center The Gallagher solution was specified for the project because of the central hub it provides The Gallagher solution was specified for the project because of the central hub it provides as well as its ability to integrate with a number of products, such as visitor management software (VMS) and CCTV. The Gallagher Channel Partner was able to offer a tailored security package that ensured LABS premises are safely monitored, guaranteeing smooth day-to-day operation. The buildings are managed by Community Managers, whose role is to understand all the companies and people who work within the LABS buildings. With this understanding the managers can bring the community together and help create beneficial relationships. Community Manager at Camden, Fran, is able to use Gallagher Command Center for a number of tasks such as monitoring who enters the building including visitors, checking which meeting rooms are reserved, what hospitality is required etc. Bluepoint Real-Time Access Management LABS also use Bluepoint Real-Time Access Management (RAM), which integrates with the Gallagher Visitor Management system to create and modify cardholders and groups. Commands sent from the integration provide muster functionality and enables Community Managers, like Fran, full visitor and staff journey awareness. In order to attract new clients, the building runs open events and also allows people to book a tour. Guests will receive a QR code on their mobile phone so they can enter the building. Fran will receive a notification to say her guest has arrived so she can meet them and show them round. People within the building can also use the same functionality for visitors. Mobile access control Leases can be short, medium or long term and range from the occupation of offices to desks Everyone who works within a LABS building has access to an app so they can book meeting rooms seamlessly, find talent, swap skills, and engage with the community. This is the customer facing tool which links to Command Center to ensure when someone books a room the relevant people are notified, and the system is updated. Leases can be short, medium or long term and range from the occupation of offices to desks. This means there are lots of leases starting and ending at different times making it difficult to keep track. By integrating with Command Center access can be instantly revoked should a lease lapse, saving Community Managers time by not having to manually deny access.
With a large campus comprising historic and modern buildings and significant research facilities and equipment, the University of Otago has assets in excess of $1.4 billion (NZD). In 2006, an internal security review of campus facilities identified that a number of critical areas – including laboratories where medical research is conducted on animals and human cadavers – could attain an increased level of security and achieve greater cost efficiency through the installation of Gallagher systems. A key priority of the security upgrade was to replace the traditional lock and key system in place in facilities across campus with Gallagher’s electronic access control solution. By moving to an entirely electronic system, the University has mitigated the risks associated with lost keys and unauthorized access. Lost and misplaced cards are reported and immediately deactivated ensuring complete control is maintained over facility access. Comprehensive alarm monitoring The team at the University of Otago needed an auditable system, capable of identifying access by people, place, and timeThe electronic system also allows for comprehensive alarm monitoring per door and per freezer, ensuring campus security is immediately notified if a door or freezer has been left open. Gallagher’s Mobile Client, available with the Command Centre v7.30 security management platform, means these alarm notifications can be communicated directly to security personnel’s Apple iPhone devices providing valuable information in real-time, to those outside of the control room. More than simply managing the access permissions across campus, the team at the University of Otago needed an auditable system, capable of identifying access by people, place, and time. Gallagher’s Command Centre application provides this high-level of traceability and enables the University to quickly and easily extract the exact information required both for internal use and for the regulatory audits required of research facilities. Identifying who accessed which areas “Due to the nature and value of our assets, it’s critical not just to control who has access to facilities but to be able to identify exactly when areas were accessed and to know who was there,” said Deputy Proctor at the University of Otago, Andrew Ferguson. Key industry challenges Eliminate the security threat that comes with lost keys Enhance the level of security for critical areas including Medical Research laboratories Procure a solution capable of producing comprehensive audit trails Introduce a secure, automated facilities management system Gallagher security products installed Command Centre Electronic card readers Syllabus Plus integration Syllabus Plus integration Syllabus Plus enables automation in the scheduling and booking of resources and equipment Founded in 1869, the University of Otago is New Zealand’s oldest university. Ranked in the top 200 universities worldwide, the University of Otago is New Zealand’s primary medical tertiary institute and is considered the top research university in New Zealand. The Gallagher system installed at the University of Otago includes a Syllabus Plus integration. Syllabus Plus enables automation in the scheduling and booking of resources and equipment through Command Centre. The University of Otago team were quick to see value in the opportunity to synchronize their access control system with class time-tables, and subsequently manage room resources by automatically unlocking doors. Easily search and book resources A key benefit for the University was a move away from the manual process of entering room bookings into Command Centre. In addition to removing the labor associated with this manual process, the university also found a reduction in the number of booking inaccuracies caused when people changed their plans, as staff can now quickly and independently reschedule their resource and room bookings if their requirements change. “Smart scheduling gives authorized users in our wider team the ability to quickly and easily search and book resources,” said Ferguson. “It’s a genuine time-saver for us and ensures our facilities are managed efficiently.” The university has implemented an ongoing software maintenance agreement with Gallagher To ensure the University of Otago’s security system remains at the forefront of technology, the university has implemented an ongoing software maintenance agreement with Gallagher to ensure they receive the latest system developments as they are released. “We would never go without software maintenance, it’s imperative that our high-end security be the best it can possibly be,” said Ferguson. Training for system operators In addition to ensuring their security products and systems are up-to-date, the University of Otago also ensures their system operators undergo regular training. According to Ferguson, “We arrange annual training with Gallagher for our Campus Watch security team. The training teaches the team valuable tips and tricks on how to utilize the system to its fullest.” During the years since the initial installation of Gallagher security systems, the University of Otago has experienced significant savings associated with not needing to re-key facilities or replace locks when traditional keys have been lost or not returned – maintenance that the University estimates used to cost tens of thousands of dollars each year.
One of the fastest growing districts in the upper Midwest of the United States, Harrisburg in South Dakota educates almost 4000 students across eight schools. Gallagher Command Centre was selected as the only solution that could meet the district’s security requirements, and in October 2015, these security measures were put to the test when the local high school was the target of a shooting. The incident resulted in one staff member being injured but was prevented from escalating further due to Gallagher’s central management platform, Command Centre, being activated by staff. Logs from the incident confirm that from the time the emergency button was pressed, it took just four seconds for Command Centre to lock all outside doors, notify district authorities, and limit building access to emergency responders only. Physical barriers for students’ security Gallagher Command Centre was involved with placing physical barriers between an active gunman and high school students"James Straatmeyer, Chief Executive Officer of Integrated Technology & Security, partnered with Gallagher for the installation of Harrisburg districts security solution. James says, “Gallagher Command Centre was directly involved with placing physical barriers between an active gunman and hundreds of high school students filling 37 classrooms. As far as I’m aware, there’s no other product on the market that has the capabilities and integration solutions for protecting students and staff to the extent of Gallagher Command Centre.” This type of security alert is of increasing concern for many educational institutions, prompting renewed focus on daily security protocols. Integrated and scalable security system Essential to providing an optimum learning environment for students is ensuring their safety and security – a responsibility the district of Harrisburg takes extremely seriously. Key to this was partnering with a security solutions provider that understood the specific needs of educational institutions, with the flexibility to employ customized features that could be tailored to Harrisburg’s particular requirements. The system needed to be fully integrated, scalable and expandable, digitally based, user-friendly The system needed to be fully integrated, scalable and expandable, digitally based, user-friendly and crucially, to assist and not replace, existing manual security procedures. Gallagher and South Dakota based Integrated Technology & Security completed the initial installation within three weeks. Since its introduction, the system has been under continual expansion. Features of updated security solution The access control system originally installed in 2013, fulfilled the region’s initial security requirements; however, a period of growth prompted the need for an enhanced system that could protect the increasing number of students. Some of the features of Harrisburg’s upgraded security solution included: Outlook calendar integration, to enable scheduling of access for special events Intercom / phone integration, to control doors from a desktop icon or smartphone Strobe light control to provide lockdown notifications in hearing impaired areas such as deaf education, shops and the gym Intercom integration for lockdown announcements Command Centre provides enterprise level lockdown controls which limit access to buildings, control fire doors, and send notifications, while providing an audit trail and video alerts. Lockdown access to all staff members An understanding of the benefits of an advanced, interactive security network is essential, and in some cases, lifesavingUsability is a highlight of Command Centre, offering access for all levels of personnel. Initially, only office and administrative staff were trained in the use of lockdown systems, but as the Command Centre’s lockdown features have developed, all staff members can now control access in individual school buildings. Once a lockdown has been activated, a notification is automatically issued to district authorities, immediately alerting emergency services if required. The security incident in 2015 strongly supported Harrisburg district’s decision to install a sophisticated access control system to protect its faculty, staff and students. At a time when concern over campus security is rising, an understanding of the benefits of an advanced, interactive security network is essential, and in some cases, lifesaving. Gallagher’s security solution offers educational institutions around the world a combination of enhanced operational efficiency and cost savings. Command Centre’s software provides a powerful and versatile feature set, enabling system operators to configure, monitor and control their unique security system.
Everbridge, Inc., the global pioneer in critical event management, announced that it has been awarded a multi-year contract to support the deployment of Australia’s next-generation national early warning system. In combination with Australia’s major telecommunications companies, the Everbridge Public Warning solution will be used to power Emergency Alert in Australia, providing population-wide alerting to help reach the country’s over 25 million residents and approximately 9 million annual visitors. If residing within an area where a sudden, critical event occurs such as fire, extreme weather or a terror attack, residents and visitors to Australia will receive location-based SMS notifications on their mobile phones, in addition to smart phone mobile app notifications and fixed line voice alerts, among other modalities. Supports first responder communications Everbridge Public Warning leverages telecom infrastructure to reach everyone within a geographic areaEverbridge Public Warning leverages existing telecom infrastructure, with no opt-in required, to reach everyone within a geographic area to reduce disaster risk, support first responder communications, and analyze disaster communication effectiveness for subsequent mitigation activities. “Our Public Warning solution enables government organizations and public safety agencies to immediately connect with every person in an affected area during a critical event regardless of nationality, residency or mobile telephone handset type,” said Jaime Ellertson, Chief Executive Officer and Chairman of Everbridge. “Australia has served as a model example for population-wide alerting and emergency preparedness over the past decade, and we are honored to support them on the evolution of their national system.” The next-generation system is scheduled to become operational in 2020.
Round table discussion
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?