inter airport Europe presents a new digital event with a sharpened focus on technology updates, market outlooks, and brand-new networking opportunities. Hosted online from 20 – 21 April 2021, inter airport CONNECT provides a much-anticipated trade and networking event for the global airport community, presenting a broad program for trade professionals including virtual product showcases, expert webinars, and plenty of matchmaking. Visitors can participate for free and register online now....
inter airport Europe 2021, the 23rd International Exhibition for Airport Equipment, Technology, Design & Services will be held at the Munich Trade Fair Centre in Germany from 9 – 12 November 2021. The exhibition in 2021 takes place against the backdrop of COVID-19. There have been many challenges for the airport industry recently, mainly evolving around travel restrictions and reduced passenger traffic worldwide due to the pandemic. inter airport Europe, as the world’s pioneerin...
IMCO Group, a foremost provider of complex solutions for air, land, and naval defense applications, will present its latest and most advanced solutions at the IDEX 2021 exhibition in Abu Dhabi. IMCO combines state of the art design, global production, and project management capabilities to provide what the customer needs where it needs it. Together with its subsidiaries, affiliates, and partners, IMCO Group offers design, development, and production of advanced modular multi-axial sensor positi...
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the se...
Axis Communications launches AXIS P8815-2 3D People Counter that combines 3D imaging software and hardware in one device to provide real-time counting of people passing through a pre-defined area. From retail stores to museums, the data can provide insights into visitor trends that can help businesses optimize their operations. AXIS P8815-2 uses images delivered by two sensors to generate a 3D depth map that strengthens the people counting accuracy. It’s ideal for challenging environments...
A new study of CCTV system managers, commissioned by security technology company NW Security, found that nearly half (46 percent) of medium and large-sized businesses across England, plan to use their CCTV systems to support remote management of processes and people in the workplace. The study also uncovered the fact that the primary reason for investing in CCTV systems in the workplace is to keep staff safe while working. Remote management One clear finding was that CCTV systems are increasi...
AVIOTEC's front-line technology offers flame and smoke detection for locations with no light. Thanks to separate additional infrared illumination unlit applications can be monitored with video-based fire detection delivering pin-sharp images. During the daytime, the device shows colored pictures and shifts to monochrome night mode when visibility drops below a pre-defined level. When daylight returns it automatically switches back to color mode. The video-based fire detection AVIOTEC IP starlight 8000 is now delivered with the new firmware. Existing installations can be upgraded to the new technology by a free firmware update. Flame and smoke detection Video-based fire detection is now also an option for applications where there is no lighting available. Due to infrared illumination less, light sources need to be installed e.g., for nighttime surveillance reducing the fire load and energy costs noticeably. In environments with no light AVIOTEC IP starlight 8000 working in monochrome mode can now perform both: fire detection and remote optical verification. Integrated day and night switch Day/night switch ensures reliable fire detection and video surveillance and provides time to solve the failure of light sources If the visible illumination fails, i.e., in tunnels, it is important to ensure that video-based fire detection is working uninterruptedly and that staff members in monitoring centers still have all the necessary insights into the situation. The integrated day and night switch ensures reliable fire detection and video surveillance. It gives operators enough time to solve the failure of light sources. This saves time-consuming and error-prone human investigation. Full redundant 24/7 illumination is not required anymore. Unobtrusive video surveillance with IR During night-time, burglars cannot spy on possible intrusion targets due to missing visible light or light sources while fire detection can be ensured. No visible illumination is used and helps to prevent burglary and arson. Combined intelligent video analytic rules also allow to track down intruders without visible light. Next to 24/7 fire detection, the new AVIOTEC version enables 24/7 intelligent video analytics for comprehensive safety solutions.
Leonardo, a foremost supplier of products and services for naval defense and maritime & coastal surveillance, is participating in the Euronaval digital/virtual exhibition between the 19th and 25th of October. With decades of experience in the domain, Leonardo can meet naval requirements for vessels of any type, class, and tonnage. Over the last 50 years, more than 50 international navies have chosen Leonardo technologies to equip more than 140 naval units. The company’s portfolio includes complete integrated combat systems, combat management systems, and communication systems as well as radar, fire control, electro-optical and navigation systems, remotely piloted airborne platforms and their payloads, ammunition, missiles, torpedoes, sonar, and electronic warfare suites. Combat Management System (CMS) Italian Navy as part of its modernization program adopted Leonardo’s CMS to equip its multi-role offshore patrol vesselsLeonardo’s modular Combat Management System (CMS) features open architecture and is reconfigurable in order to fit any ship configuration. Its high level of flexibility means that customers can choose to have a wide range of systems integration. The Italian Navy, as part of its modernization program, recently adopted Leonardo’s CMS to equip its multi-role offshore patrol vessels (Pattugliatori Polivalenti d'Altura (PPA)). SENTINEL Tactical Voice Terminal (TVT) In the communications domain, Leonardo is promoting its naval voice distribution system SENTINEL TVT (Tactical Voice Terminal). For combat scenarios, the company is highlighting its Black Scorpion light torpedo as well as the Vulcano 127mm ammunition and a new small-caliber system, alongside the ULISSES (Ultra Light SonicS Enhanced System) sensor which is designed to maximize the effectiveness of Anti-Submarine Warfare (ASW) operations. Meanwhile, the Janus multi-sensor electro-optical system offers medium and long-range visual surveillance capabilities in a single package. Airborne radars In the radar domain, Leonardo is marketing its Osprey (E-scan) and Gabbiano (M-scan) multi-mode, multi-mission airborne radars, both of which can operate in all weather conditions over land, sea, and coastal regions. The lightest variant of the Gabbiano family, the Gabbiano TS Ultra-Light, has been integrated into the AWHERO remotely piloted helicopter, which has been successfully demonstrated in international projects such as OCEAN2020, the European sea surveillance research program. AWHERO integrates sensors made by Leonardo and is optimized to fly from naval units to perform multiple roles. Leonardo leads the market in providing helicopters for naval use, with the widest and most advanced range of products available.
Hanwha Techwin has launched AI deep learning based video analytics Social Distance Measuring application which, in a COVID-19 affected world, helps businesses to implement their social distancing policies. Developed by A.I Tech, Hanwha Techwin’s award-winning technology partner, the server-based Social Distance Measuring application is able to accurately measure the distance between people in a camera’s field of view and will generate an alarm if social distancing rules are not being complied with. Users can also be alerted if the number of people within an area exceeds a specified threshold. Indoor and outdoor environments Compatible with all Wisenet cameras, the application has been developed for use in workplaces, such as offices and factories, as well as a wide range of other indoor locations including art galleries, museum and places of worship. The Social Distance Measuring application performs equally well in outdoor environments and offers a highly effective social distancing implementation tool for public transport environments and in city centers where local authorities are looking to monitor and manage the crowds which may gather in popular locations. Video Management Software The application has been integrated with Wisenet WAVE Video Management Software (VMS), with users having the option to use web-based AI Tech dashboard to collect, aggregate, view and act on alarms and events from multiple camera streams. The data can also be visualized through charts, tables and images, while data is easily exported through .csv, .jpeg or .pdf and integrated into third-party systems. The dashboard is fully customizable to meet individual user’s operational requirements and is accessed via a PC, smartphone or tablet. Social Distance Measuring application “In our ‘new normal’ world, there are countless businesses who wish to give their colleagues, customers and visitors confidence that the need for a safe distance between them, is being respected,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The Social Distance Measuring application will help them do so and as such, perfectly complements the capabilities of our license-free Occupancy Monitoring solution which is designed to be installed at entrances and accurately counts the number of people entering or leaving a building. Both are part of a suite of COVID-19 related solutions offered by Hanwha Techwin, which also includes a Face Mask Detection application.”
ABLOY, the physical security and door product company, has launched its new eCLIQ electronic lock through ASSA ABLOY Security Solutions. Featuring a chip and 128-bit AES encryption, the new eCLIQ has been developed to offer security and resistance to electronic attack, the manufacturer says. Its microelectronics ensure communication between lock and key, while the eCLIQ cylinders and programmable keys are robust enough to withstand the harshest weather, the company adds. eCLIQ’s flexibility means security managers can update access authorisations when required. Lost eCLIQ keys can be revoked, cutting out the time and money spent on changing lock cylinders and re-cutting keys. The product also offers time or area restricted authorizations for an eCLIQ key. For example, contractors could be given access rights for the duration of a job. Once the job is completed, access is withdrawn from the eCLIQ key. Integrated lubrication reservoir Simon Wilson, National Sales Manager for ASSA CLIQ Remote at ASSA ABLOY, said: “Our CLIQ technology has already proven itself by securing buildings all over the world. eCLIQ is the next step for this technology, delivering a fully electronic locking system for industrial businesses, museums, event venues, public administration buildings and educational institutions. For any organization needing a powerful locking system, eCLIQ provides a secure, flexible solution, with minimum fuss.” “The eCLIQ cylinders and keys meet the latest industrial standards for electronic locking systems, including DIN 15684 and VdS 2156-2. The range includes cylinders that work in temperatures from minus 25 degrees C to 85 degrees C without issue. The durable, reversible electronic key is also waterproof to the IP67 standard, ensuring users can rely on eCLIQ whatever the weather. Another key benefit is that thanks to its integrated lubrication reservoir, an eCLIQ cylinder can remain maintenance-free for up to 200,000 operational cycles. This helps reduce time and costs spent on replacement cylinders.” No wiring needed “Finally, installation is a simple process too, with no need for wiring. Cylinder electronics are powered by an easy-to-replace standard battery inside every eCLIQ key, with a lifetime of 30,000 cycles. Plus, with features including adjustable Euro profile cylinders that provide a minimum length of 28mm and centred keyway, eCLIQ can be fitted to doors or other openings without any alteration. The eCLIQ range includes components for padlocks, mailboxes, alarm systems and more.” “As a result, eCLIQ offers a more durable, secure, efficient and flexible locking system than other conventional technologies available on the market.”
Places of leisure, where people spend their downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. They can’t just lock be locked down and hope that no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk, separating authorized from unauthorized people and locations, is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent locking solutions Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. The right access solution can help system administrators do it safely without putting a burden on those responsible for everyone’s security. Controlling access to outdoor sites and visitor attractions Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote, far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere, thereby matching or exceeding the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within the system exactly like standard interior locks. Intelligent electronic key systems Intelligent electronic key systems are budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems can be rolled out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attract tens of thousands of tourists every year. Both mechanical and electromechanical locking solutions protect a site, which houses critical infrastructure and watersports facilities, with disparate security needs. Here, electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed, when keys are lost. Permissions are simply deleted from the system software. Upgrading zoo access control system In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours, for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector Securing museums, open spaces with priceless contents presents one of security’s biggest challenges When Edvard Munch’s painting ‘The Scream’, was stolen from an Oslo museum in 1994, thieves left a note which read, ‘Thanks for the poor security.’ Securing museums, open spaces with priceless contents presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key to be able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation with obvious security benefits. Companion software makes key tracking straightforward, with administrators always knowing who exactly is carrying credentials and they can refine or amend those permissions quickly, and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Protecting high-value assets and exhibits London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Electromechanical locks now control access through 56 doors, forming part of a security ecosystem, which incorporates traditional mechanical locks as well. Using intuitive management software, security managers ensure every staff member accesses only the right areas. CLIQ from ASSA ABLOY installed at museum The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be ‘subtle, but ever present,’ according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. CLIQ access control technology This was the checklist facing France’s Musée Maurice Denis, the museum is inside a listed 17th century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered class-leading security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Robust, hard-wearing cylinders and padlocks installed Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside, and outside the main building with waterproof padlocks protecting CCTV camera that are housed on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th century warship, Vasa demand Sweden’s highest level of locking, Class 3. Yet, the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. CLIQ Remote electromechanical technology Around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now, facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites According to one study completed two decades ago, people spend 87% of their time indoors. The number is probably higher now and includes a huge chunk of everyone’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here, over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Benefit of CLIQ electromechanical cylinders Yet, a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key, which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail, who accessed which lock and when, takes a couple of mouse clicks. Electronics-inside CLIQ locks CLIQ also cuts Festival Place operational costs. The electronics-inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever we gather to enjoy leisure, indoors or outside, CLIQ enables easy access control for all openings with just a simple, single, programmable key.
Hundreds of thousands of priceless artifacts in several Iraqi museums have been protected from the threat of theft and looting by marking them with SmartWater’s unique invisible code. Unique invisible code Funded by the British Council, approximately 273,000 artifacts held in Iraqi museums have been protected using this new approach. Priceless objects can be traced back to the site they were stolen from, making it easier for law enforcement agencies to prove theft, thereby creating a powerful deterrent to would-be thieves and traffickers. The artifacts include inorganic pieces from all periods of Iraq’s past; stone-age axes to Neolithic pots dating back to 7000 BC when the world’s first agricultural villages were being established. In 2003, and during the ISIS occupation of Mosul between 2014 and 2017, items like this were frequently looted from museums, later resurfacing on international antiquity markets. SmartWater forensic liquid SmartWater forensic liquid marks a unique chemical signature onto artifacts and other museum objects SmartWater forensic liquid marks a unique chemical signature onto artifacts and other museum objects. The solution is invisible to the naked eye, detectable under UV black light and scientists only need to recover a speck of SmartWater to prove which location the artifact was stolen from, the date the solution was applied and by whom. Collaborating with scientists at Reading University, SmartWater established that the forensic liquid causes no damage to stone, pottery, metal, or glass and can withstand intense heat, harsh solvents, and extreme environmental conditions for decades. Enhancing artifacts security in museums Professor Matthews, at Reading University, commented, “The items in the museum collections are priceless, with regards to the immense cultural value they offer to Iraq. This initiative effectively gives objects a chemical fingerprint, allowing them to be traced if they fall into the wrong hands.” He adds, “Moreover, it provides law enforcement agencies with the necessary evidence to arrest and prosecute those found in illegal possession of artifacts.” SmartWater forensic signature Phil Cleary, Chief Executive Officer of The SmartWater Group, said, “The problem of theft of artifacts from museums, archeological and historic sites is growing. We’re delighted that we’ve been able to support this important initiative in Iraq.” Phil adds, “Due to their SmartWater forensic signature, these important museum collections are now traceable and can be repatriated if stolen or trafficked. Forensic markers present a real risk to sellers and buyers of stolen artifacts.” All the costs of R&D were funded by the SmartWater Foundation, the not for profit arm of The SmartWater Group, one of the world’s fastest growing risk management companies.
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly. This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees. The affect of COVID-19 on safety and security To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitization, the lines between the security and maintenance just blurred. From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitization policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention. From an operations perspective if we enabled a sanitization issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake. Standards for sanitisation Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitization has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic. To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines: Develop your plan Implement your plan Maintain and revise your plan While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitized. The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects. The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in. The challenge is when you step back and consider what people touch in a day; the list quickly grows Operating efficiency If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down. This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially. Post COVID rules Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitization requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations. Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it. The digital transformation COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity. At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase In Cybersecurity Threats And Breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organizations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand For Safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalize on opportunities for growth in the coming year.
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organizations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA Case Study But does that mean that organizations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organization to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology Adaption Works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realized the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organizations must find way to implement new biometric systems that simultaneously provide organizations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, With Added Value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalized service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalized programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customized experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilizing the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start With Biometrics In Optional Locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate Users In Advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organizations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organizations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organization a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognize the benefits it provides.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The Role Of The IT Department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment” They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The Role Of Consultants And Specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The Need For Standards On Cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organizations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analyzed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardized format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardized industry you will ever see, and security is the least standardized. But they’re merging. And that will drive standardization. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management.IT is the most standardised industry you will ever see, and security is the least standardised" The Role Of Training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organization. That would be a good starting point. The Role Of Integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organization, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organization - so training is very important The Impact of Pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Size can be a major factor for any security project. The bigger the scale, the greater the challenge. With hundreds of doors and a 3km perimeter, the Flanders Expo is larger than most buildings. They sought a modern replacement for mechanical locking — which was ‘time-consuming and not practical for users,’ according to Bart Serraes, Operations Supervisor for the Easyfairs Group. Choosing electronic security made sense: it saves security staff wasting time traveling physically around a big site. Wireless door devices were also important because laying a projected 10km of cabling would be expensive and impractical. Electronic locking technology Locking technology would need to serve both interior and exterior doors; Flanders Expo has many of both. Insurance requirements demanded electronic locking technology which could also activate deadbolts. Key-operated CLIQ® electromechanical locking ticked all the boxes: “CLIQ intelligent key technology provides the familiar security of traditional locking alongside the powerful features of electronic access control,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. CLIQ has a unique combination of high-end mechanical and electronic protection. A range of key-operated electromechanical cylinders and padlocks maximize physical attack resistance. CLIQ technology layers encrypted, user-friendly electronic security on top — adding control and convenience without adding wires: all CLIQ devices are wireless. Power to operate lock microelectronics comes from a standard battery inside every CLIQ key, with a lifetime of up to 10 years. More flexible system The electronics inside every lock are activated when a battery-powered CLIQ key is inserted And because it is key-based, CLIQ offers a simple step up from mechanical security. “As a company, we needed a more flexible system. That's how we chose CLIQ,” adds Bart Serraes. Programmable CLIQ electromechanical locks now secure over 200 interior doors at the exhibition hall, as well as 100-plus openings around the building’s perimeter. Because CLIQ’s programmable keys can operate the deadbolt — not just the latch-bolt — door security meets standards set by Easyfairs’ insurers. The electronics inside every lock are activated when a battery-powered CLIQ key is inserted, meaning no door wiring was needed. With their mechanical system, “The chance of losing keys was high, the process to get new keys not user-friendly,” says Bart Serraes. Web manager software Now they can program keys to allow access for different types of user, using the intuitive CLIQ Web Manager software. They flexibly grant or deny access to both internal users and external partners and suppliers — and revoke rights in any lost key without needing to change the locks. CLIQ is a “Flexible system for determining access rights,” says Bart Serraes. Flanders Expo became the first Easyfairs site to install CLIQ access control. A second venue has already followed. Partnering with a pioneer, with a long history of innovation and service provision, gives Easyfairs a system that is reliably supported and can evolve over time. Perimeter and interior security now have the flexibility they need: CLIQ locks can be installed and integrated into their access control system anytime.
Bosch Building Technologies has installed an intrusion alarm system at the UNESCO World Heritage Site: the Mausoleum of Qin Shihuangdi in the city of Xi'an, China. Several hundred TriTech motion detectors are deployed to protect the 16,300-square-foot museum against theft and damage. These detectors prevent costly and time-consuming false alarms under challenging environmental conditions while providing detection reliability of real alarms. Because of the highly efficient intrusion detection system, the museum can dispense entirely with physical protective barriers such as glass walls, allowing visitors to directly experience their clay heroes. “The cooperation with Bosch is an excellent showcase of modern high-tech protection of historic buildings. Bosch intrusion alarm systems help to upgrade the security level of these unique historic sites,” says Ren Xuxin, Project Manager of Xi’an Terracotta Warriors and Horses Pit Security Upgrade Project. Intelligent alarms protect millennia-old warriors As wall detectors, the TriTech motion detectors protect the pits where the terracotta warriors are located. Because these pits collect large amounts of dust that could cause false alarms, the intelligent sensor data fusion algorithm in each of the rugged detectors checks potential alarms with a PIR sensor and microwave Doppler radar for a consistent result. The area to be protected is thereby also secured from above by ceiling-mounted TriTech motion detectors. These detectors are located 4.8 meters above the museum floor, yet operate accurately and reliably. They thus exceed the range of standard ceiling detectors by more than two meters. The TriTech motion detectors provide round-the-clock protection for the museum In the event of a security breach, the Bosch G-Series system controller sends an alert, including the location of the triggered detector, in less than two seconds to the security team in the control room, which uses live images from a video system to verify the alarm. Round-the-clock protection In most cases, tourists trigger an alarm when they cross a threshold to retrieve their cameras or smartphones that have accidentally fallen into the pit. In doing so, there is a risk of damage to the terracotta warriors, but even if real criminals should ever get into the act, the system is ready. The TriTech motion detectors provide round-the-clock protection for the museum. Due to their discreet design, the detectors are unobtrusive and thus do not interfere with the museum experience. In accordance with the museum operator's list of requirements, the intrusion detection system protects not only the museum, including the perimeter, as well as the visitor areas of the mausoleum but additionally the cultural treasures currently stored in the unmanned warehouse.
Ipsotek, a pioneer in artificial intelligence (AI) powered video analytics, has announced that it has been awarded a security systems project at the Katara Culture Village in Doha, Qatar, in partnership with Mannai Trading Co, a Qatari based company listed on the Qatar Stock Exchange. Ipsotek’s highly scalable VISuite AI platform and advanced VISuite FR facial recognition system have been selected and approved by the Qatar Ministry of Interior to improve the security and safety as well as provide business intelligence at the iconic cultural village of Katara. VISuite AI enables users to efficiently manage automatically generated alarms in real-time, resulting in reduced operator response times and the ability to track chosen behaviors of interest in complex environments. Security threat VISuite FR automatically detects and informs operators of people that have visited a site multiple times in a configurable timeframe and could pose a security threat. It is optimized for use in busy and security-sensitives scenarios where the highest level of recognition is required. In addition to the project at Katara in collaboration with Mannai ICT, Qatar’s renowned Systems Integrator and the Information & Communication Technology Division of Mannai Corporation, Ipsotek has a number of other major projects across Qatar. The company has also announced that it has appointed Mr Jihad Marei as Country Manager for Qatar and is in the process of opening a new office in one of Qatar’s Free Zones. Key strategic partners We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co." Also known as ‘The Valley of Cultures’, Katara is one of the main cultural destinations in Qatar, featuring a museum, open amphitheatre, opera house, movie theater, conference hall, beach, Souq and multiple restaurants. Katara hosts hundreds of events and attracts over 10 million visitors each year. Charlie Bennett, Ipsotek Head of Sales for EMEA said: “We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co. Mannai has become one of our key strategic partners in Qatar and we have enjoyed collaborating on several projects together this year, which is why we have also chosen to grow our presence in country further by employing Jihad Marei as Country Manager and open a dedicated office in Qatar.” Artificial intelligence video analytics Shamnad Karuvadi, Deputy Manager ELV Physical Security at Mannai Trading Co said: “We are very pleased to be working with Ipsotek as our solution partner for Artificial Intelligence Video Analytics. Ipsotek has added a great deal of value to the Mannai solution portfolio and together we look forward to providing the highest levels of safety and security to protect critical infrastructure. We would like to extend our sincere thanks to Charlie Bennet & Mr. Jihad Marei at Ipsotek for their extensive support.”
Two museums, a single security environment. As a result, access management was eating up significant time and budget for the museums’ Technical and Security Manager. The solution for simpler access management was eCLIQ, an electronic locking system built around easy-to-fit cylinders and programmable, battery-powered keys. The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential — for both internal and external users. They needed a system able to cope easily with changes, site extensions and two-site operation; a solution which would remove the need to change all cylinders when an employee loses a key. Simplified access management Now the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders across the two sites. The eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key-holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Monitoring service providers Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to both employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers — and their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. Fitting eCLIQ locking was simple and wire-free: museum staff performed the installation themselves. One training session with the admin software was sufficient to put them at ease with their new system. Efficient energy management Looking after eCLIQ components is also easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. “I am very happy with the eCLIQ solution,” says M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums. “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council to show the effectiveness and simplicity of the eCLIQ solution. Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
Schools and heritage sites present their own unique difficulties for security and access control. It becomes a challenge when the same is to be applied to a school that is also a heritage site of exceptional value. This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum that requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School chiefs also required little disturbance of everyday school learning. Wireless access control was the obvious answer. A wireless access solution to a 16th-century problem Powerful management option enables real-time security control to limit free access to and around the site SMARTair® wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts) are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for its new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorized people can enter the school.” SMARTair locks and readers SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation and integration The system was installed without a hitch and also without any disruption to classes" The installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor. To learn how easily SMARTair® wireless access control could secure your premises, download a free solution guide at https://campaigns.assaabloyopeningsolutions.eu/smartair
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Best Practices Guide: Analog Video To CloudDownload
Delivering a Smart, Secure and Healthy Workplace with CloudDownload
Are Your Technology Providers Keeping You In The Dark?Download
Capture New Opportunities With Computer Vision And Video AnalyticsDownload