ReconaSense, a provider of innovative physical security intelligence and next-gen access control, announced the debut of its ReconMobile command-and-control center that lets users lock down facilities, tap into video surveillance systems, and/or report and respond to an emergency from a mobile device. Managing a large campus or facility means being in charge of a myriad of systems, dynamic populations, and countless points of entry. Lack of reliable data about any of those can lead to expensive...
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situatio...
Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 dea...
Ping Identity, a provider of Identity Defined Security, announced that Kevin Sellers has joined the company's leadership team as the global chief marketing officer. Sellers leads all aspects of the company's marketing function, with a focus on accelerating expansion in the enterprise market and growing Ping's brand globally. An accomplished business leader with a strong track record of scaling global brands, Sellers brings more than 20 years of global marketing leadership experience in the te...
GET Group North America, an innovative developer of mobile ID technology with over 20 years of experience in secure government credentials, announced that its GET Mobile Administrator will enable DMVs and other ID card Issuing Authorities to provide mobile driver's licenses (mDLs) and other forms of mobile identification (mIDs) that comply with global interoperability standards. GET Group NA, with its technology partner Scytales AB, is working with the International Standards Organisation (ISO)...
Pulse Secure, the provider of software defined secure access solutions, announces that growing demand for hybrid IT and Zero Trust Secure Access, resulted in double digit deal volume growth in the first half of 2019. Additionally, the company announces significant achievements in product innovation, channel programs, customer service and talent acquisition. “Our sales growth demonstrates that we offer the most flexible and robust platform for Secure Access. We are ideally positioned to ca...
Morse Watchmans announces that its KeyWatcher Touch Key Management System has once again received LenelS2 factory certification and interfaces with the LenelS2 OnGuard version 7.5 access control security system. “Morse Watchmans has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system,” said John Marchioli, OAAP product management, LenelS2. “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program.” Unique and powerful solution “The collaboration between Morse Watchmans and LenelS2 will provide a unique and powerful solution with comprehensive capabilities within a single framework,” said Joe Granitto, COO, Morse Watchmans. “Using this interface, customers can now sync cardholders with the KeyWatcher Touch Key Management System, allowing them to remove and return assets using OnGuard access levels.” The new interface also allows administration to associate OnGuard access levels with different Key Groups, providing increased key control from within the OnGuard platform. The system’s modular design offers full scalability to enable systems to meet current and future needs.
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasizing the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official turnstile sponsor of the show. Appropriate entrance solution Security entrances coupled with access technologies provide a complete solution Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with the appropriate entrance solution. Swinging doors do not stop one authorized person from opening the door and then holding it open for a number of others. Security entrances coupled with access technologies provide a complete solution that ensures only one person can enter per valid authorization. The following solutions will be on display in Boon Edam’s booth: Lifeline Speedlane Swing Optical Turnstile: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave™ touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. New! Lifeline Boost Access Control Pedestal: The Boost is a brand new, stylish access control pedestal designed by Boon Edam to complement the popular Lifeline optical turnstile series. The Boost will include the latest version of Essex’s credential card reader, now with optical Bluetooth and OSDP capability, the iRox-T with BLE expands for HID Global’s Mobile Access solutions. Tourlock 180+90 Security Revolving Door: The entrance of choice for the Fortune 500, the Tourlock will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock Mantrap Portal: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, while facial recognition provides instant authentication inside the portal. The secure, edge-based facial recognition access control device by Alcatraz, called the Rock, can also be experienced at their booth (GSX booth #1047). BoonConnect Software: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Upcoming tailgating season Boon Edam is celebrating its position as the market pioneer for security entrances, according to a report by IHS Markit®, with a tailgating-themed prize giveaway. All visitors to GSX are invited to participate by visiting booth #1103 during show hours. Participants will have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg® grill, a YETI® cooler and more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email by Friday, September 27.
Johnson Controls has updated its Tyco Software House C•CURE 9000 security and event management system with new tools to optimize its security operations. Enhancements include metatags, broadened search capabilities and enhancements in video association, along with adding an additional layer of security with Multi-Factor Authentication mobile integration. C•CURE 9000 v2.80 users now have the ability to add two-factor authentication without needing to upgrade readers. With this added layer of security, users are notified on their mobile phone the moment their badge is used on a two-factor configured door, and have the option to approve or deny the access request as a second form of authentication, which helps to mitigate lost or stolen cards. Robust and customizable search capabilities C•CURE 9000 v2.80 also focuses on enhanced search capabilities with an emphasis on video association strengthening our access-led unification. Smart Search allows users to easily search for object names, object types, and tagged locations throughout the system. In addition, metatags provide an easy way to add attributes to items, allowing for more robust and customizable search capabilities that greatly reduce configuration time. C•CURE Web was updated with a health diagnostics dashboard which provides a snapshot of how the system is performing Additionally, C•CURE 9000 v2.80 includes a variety of new views, including the Receptionist Portal, simplifying visitor management with a dedicated dashboard which allows untrained C•CURE 9000 users the ability to manage the entire visitor lifecycle within C•CURE Portal. C•CURE Web was updated with a health diagnostics dashboard which provides a snapshot of how the system is performing over the last seven days. Automatic device-To-Video mapping The new Security View performs automatic device-to-video mapping to view devices and associated video, live or recorded, closest to an alarm/incident from one intuitive screen thus saving on configuration time. This feature is available for all Tyco cameras including the Illustra product line, as well as all third-party video partners. “The addition of mobile multi-factor authentication, coupled with our security operations enhancements in how we tag, search, and associate video makes C•CURE 9000 more accessible, and data more manageable than ever before,” said Ashley Tousignant, Sr. product manager, Access Control. “We look forward to continuing to provide more secure, intuitive solutions through our own products, as well as through our trusted partners.”
Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralizes and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow. This initial feature release is designed to help schools better evaluate and track their mobile fleets and grow their device environments safely to ensure they can generate better results and promote the growth of their tech programs. Features of Prey for Education IT managers can also review further inventory data, such as battery and network connection per devicePrey for Education was developed in collaboration with Prey’s education customers to provide the following: Scheduled Automations – This new capability allows managers to schedule Prey actions on their devices, such as the lock, alert, and alarm, to be executed on specific days, hours, and data ranges. For example, a curfew lock can be set from Monday to Friday at 6pm to deter out-of-hours device usage. Reactive Security – New Control Zone Actions Triggers integrate with the Control Zone settings, Prey’s geofencing movement detection parameters, to precipitate reactions and eliminate reaction time in case of an eventuality. Users can configure Prey’s alarms, alerts, locks, and the ‘Mark as Missing’ evidence reporting feature whenever a device enters, or leaves a designated area. Specific actions can be assigned to both the entry, and exit. Inventory Management – IT staff can now assign a user or specify a contact for each device. An Online/Offline tag has been added to provide visibility on the devices’ connection, as well as a ‘Last Seen Online’ device sorting for quick visibility. As for device status, IT managers can also review further inventory data, such as battery and network connection per device, together with the logged in user. The multi-OS Prey for Education platform allows IT managers to group devices by class, usage, or state with custom tags Unified Management – The multi-OS Prey for Education platform allows school IT managers to group devices by class, usage, or state with custom tags; view device status or hardware changes; and assign them to faculty or students. Data Privacy – An extra layer of FERPA / data privacy compliance is delivered with data wipe and retrieval reactions, and Prey’s tracking and evidence gathering are configurable to boost end-user privacy. Promoting safe mobile environments “The Control Zone Actions and Scheduled Automations were created from the feedback our users gave us regarding their multi-tasking and high-pressure workflow. In the end, we’re trying to make their work as easy as possible. For example, they can now do things such as create digital curfews for their devices and ensure their fleet is locked up when the day ends,” said Carlos Yaconi, founder and CEO of Prey Inc. “We’re doubling down on our promise to help promote safe mobile environments for NGOs, schools, and universities, and we will continue to work with our partners to enhance and deliver new solutions for them.”
AMAG Technology, global provider of unified solutions that help organizations mitigate risk, introduces its Symmetry GUEST visitor management family of interactive touch screen kiosks. Symmetry GUEST kiosks Symmetry GUEST improves the visitor experience by automating all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area, enforcing compliance and reducing operating costs. Eliminate paper logbooks and create an audit trail to properly manage visitors. Kiosk setup is fast and easy as the software and hardware come pre-installed. “End users will find Symmetry GUEST Kiosks improve visitor traffic flow and are a sleek and innovative addition to their lobbies, improving first impressions while mitigating risk,” said AMAG Technology, Sr. Product Manager, Jim Murray. Visitor management system Countertop style kiosks provide options for either unfixed or fixed mounting The Symmetry GUEST Kiosks come in three main designs (Countertop, Slim Wall Mount and Freestanding) and two colors (white or black) with custom branding options to best meet your visitor check-in requirements and lobby décor. Countertop style kiosks provide options for either unfixed (portable) or fixed (secure) mounting to a receptionist desk or check-in counter for easy access. Slim Wall Mount kiosks mount flush to the wall or glass and are perfect for small lobbies or large, such as busy areas where multiple units are needed to efficiently check-in a high volume of visitors. Freestanding kiosks come with or without cabinet and printer. Custom branding options are available for all Symmetry GUEST Kiosks enabling organizations to place their visitor check-in messaging and logo on the kiosk for increased visitor engagement. AMAG Technology’s Symmetry security management solutions are deployed across a wide variety of market segments from commercial to government, education, healthcare, banking, transportation, utilities, plus many more.
BlackWire Designs, a distributor in the custom installation market, announced that the company is now offering ProDataKey's (PDK) pdk.io, the industry's first completely cloud-based wireless access control system. The plug-and-play solution is easy for dealers to install, highly scalable, and simple for end users to manage. With its easy-to-use interface, pdk.io allows users to effortlessly manage cloud access control and see the status of every facility door in a single glance, while streamlining the programming process for installers. The platform provides full mobile management from any internet-connected device, real-time monitoring and customisable alerts, automated updates, six months of cloud backups, and more. Better customer experience "Unlike typical access control systems that are extremely complex and require the IT department or a dedicated employee to manage, pdk.io features an intuitive interface that eliminates any learning curve," said Kevin Luther, owner of BlackWire Designs. We are excited to add PDK to our product line-up and to bring all of these benefits to our dealers and their customers""For dealers, this means fewer support calls and a better experience for their customers. And any issues that do arise can be addressed off-site, opening up the possibilities for recurring monthly revenues through remote management programs. We are excited to add PDK to our product line-up and to bring all of these benefits to our dealers and their customers." Quick and cost-effective door installation Each PDK system is built around a CloudNode or a rack-mount CloudNode SE gateway, which connects to the door hardware and network. The CloudNode can be used as a stand-alone device for single-door installations or can connect with up to a thousand doors on a single platform. Doors can be quickly and cost-effectively added with Singleio or Eightio plug-and-play controllers, which offer the flexibility of network, PoE, and wireless connectivity options and are equipped with a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health. Available system readers include the standard Mullion-style, ruggedised touchscreen keypad and the ruggedized HD reader with an eye-catching stainless-steel design. PDK will also soon be introducing a Bluetooth reader for credentialing via mobile devices.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-Store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behavior is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail Banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimize, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalized enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centers (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximize situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernized and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimize human error and optimize resource utilization. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command center through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-Expanding Edge Devices Market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud Computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge Computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralized cloud computing and even coins the phrase, “Cloud computing, decentralized” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost Efficiency Of Edge Processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilizing edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilizing edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunitiesThe search for an answer to the challenges of growing human urbanization is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centers and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behavior and gun violence. Such crime prediction software works by analyzing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organizers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favorite soccer team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defense & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritized, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a soccer game. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organizers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organizers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same soccer team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 meters using the latest UHF technology. With consistent reading up to 5 meters and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive widescreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives When the uPASS Reach reader is installed (maximum height two meters) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 meters as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 meters when installed inside non metallized windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallized, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environmentsThe Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 meters with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
HID Global, globally renowned trusted identity solutions provider, has announced support for Seos-enabled student IDs in Apple Wallet. Beginning this fall, students, faculty and staff at Clemson University will be able to add their IDs to Apple Wallet and use their iPhone and Apple Watch to access buildings on campus, purchase meals and much more. Seos-enabled student IDs “HID Global is excited to play an important role in creating transformative connected university experiences that make it easy for students to simply use their iPhone or Apple Watch to enjoy all that daily campus life has to offer,” said Stefan Widing, President and CEO with HID Global. HID’s technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students" Stefan adds, “HID’s broad range of technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students, faculty and staff take full advantage of convenient mobility applications. This fall, their Apple devices can be used for everything from entering buildings – such as residence halls and individual rooms – to buying meals, accessing the gym, and using secure print services and numerous other university resources.” iCLASS SE reader modules To support student IDs in Apple Wallet on iPhone and Apple Watch, HID provides Seos-enabled credentials, HID iCLASS SE and HID OMNIKEY readers, embedded HID iCLASS SE reader modules, and Corbin Russwin and SARGENT electronic locks from ASSA ABLOY. Through HID’s support of student IDs in Apple Wallet, Clemson students will be able to seamlessly access residence halls, libraries and fitness centers, buy lunch, make purchases at the university store, print documents and more by placing their iPhone or Apple Watch near a reader where contactless student ID cards are accepted. Contactless student IDs Contactless student IDs are supported on iPhone 6 and later and iPhone SE. On iPhone XS, iPhone XS Max, and iPhone XR, student IDs may still be used for up to five hours in power reserve mode when the iPhone battery needs to be charged. Student IDs in Apple Wallet are not only convenient, they also provide an extra level of security as students no longer have to worry about misplacing their physical card. School credential provisioning is protected by two factor authentication.
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalized branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilizes a token model such as Open Authorization The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilizes a token model such as Open Authorization. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
NiskhamSWAT, a charity that provides hot meals and everyday essentials to homeless people in the UK, has partnered with Videx Security, to overcome their access control and entry challenges. The charity, which was established in 2009 in West London, now serves disadvantaged communities in Oxford, Reading, Milton Keynes, Birmingham, Slough, Windsor and Lancashire as well as London. It’s run by volunteers and the charity currently has 1,300 volunteers across the country, serving those who need it the most. Need of a convenient access control solution We needed a more flexible and convenient access control solution that still provided a high level of security too"Randeep S. Lall, Global Operations Director at the charity, said: “We provide 3,000 meals per week to those in need which means our main warehouse in London is extremely busy 24 hours a day, seven days a week. Security and appropriate access and entry are so important." “Although we have a secured electric gate that drivers have to report to in order to gain entry, it meant someone had to permanently stay at the warehouse to grant delivery and collection vans access. This wasn’t sustainable given we are a completely volunteer led organization. We needed a more flexible and convenient access control solution that still provided a high level of security too.” NiskhamSWAT, who have recently won a Queen’s Award for voluntary service, worked with leading access control and door entry distributor, ADI to overcome their entry challenges. GSM audio kit with code lock Joseph Davies at ADI explained: “We recommended a GSM access control system to NiskhamSWAT to help solve their entry issues. After researching which solution would work best, we advised that the charity used a Videx two-way GSM audio kit with code lock and proximity access control in a 4000 series style panel.” The GSM system we’ve donated to them enables people to answer calls to their front door or gate from mobile phone" Neil Thomas, National Sales Manager at Videx, continued: “When ADI contacted us, we were more than happy to help provide a system that could solve NiskhamSWAT’s access problem. The GSM system we’ve donated to them enables people to answer calls to their front door or gate from their mobile phone or landline, so they never have to miss that important visitor and are made aware of who has visited even when they are not there.” Easy programming of the entrance panel For NiskhamSWAT, this means that no one is required to remain at the warehouse 24/7 to authorize access. If a van arrives for a collection or delivery and no one is there, the system will call the designated number for access and has the facility to divert to another number if the first call is not answered, with a maximum of up to four numbers per button. Programming the entrance panel can easily be carried out either by SMS or dialling into the system using a telephone without a keypad. Randeep at NiskhamSWAT added: “Huge thanks to ADI and Videx for the donation and free installation from Image Security too. It’s helped us out massively as it meant no one has to stay at the warehouse, freeing up precious volunteering time that can be put to better use elsewhere. It’s so much more convenient to receive a call when someone is asking for access. I can verify the caller and swiftly authorize or deny access.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorized intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimizes future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?