Near Field Communication
HID Global, a globally renowned company in trusted identity solutions, has announced that it is the world’s first ticketing solution provider with a software development kit (SDK) that is fully certified and compliant to Calypso HCE standards, for secure and convenient mobile ticketing on smartphones. SDK certified to Calypso Standards The certification specifies how to protect ticket data stored in the mobile device’s wallet, helping transport operators to effectively fight fraud,...
Radio Frequency Identification (RFID) provides new and profitable opportunities for increasing organizational, financial and operational performance. For instance, the retail and logistics industries can benefit from the superior RFID technology. RFID readers and solutions DENSO WAVE EUROPE (Denso Wave), member of the Toyota Group, has developed and deployed various RFID readers and solutions, which are used for inventory management, in-store product movements at the POS, for warehouse managem...
Local authorities must better communicate the benefits of smart technology’s role in combatting climate change, according to new research. As climate change and its subsequent natural disasters dominate the global news headlines, research by technology expert, Milestone Systems, found that 80% of Britons want their local authority to take more effective action against climate change, as 230 councils have declared a climate emergency in their regions. Tackling climate problems Almost one...
Integrated security manufacturer TDSi announces its forthcoming appearance at The Security Event, the major UK commercial, enterprise, and domestic security event which takes place from 7th-9th September at the NEC Birmingham. As one of the first major UK security sector events since the pandemic, TDSi will be showcasing its latest products - including the newly enhanced TDSi GARDiS range of hardware and software systems. Benefits of GARDiS range Looking ahead to Th...
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Continental Access, a division of NAPCO Security Technologies, Inc., is pleased to introduce Michael Venoit as the new Continental Access Vice President of Sales. Michael Venoit comes to Continental Access with a successful track record of strategically driving sales and growing revenue in security and access control, having previously worked for several well-known industry manufacturers. Managing Continental Access accounts We are happy to welcome Michael aboard, he’s got great energy...
photonicSENS, a pioneering supplier of single-lens 3D cameras for next-generation depth perception has collaborated with Qualcomm Technologies, Inc. to accelerate the commercialization of its industry-leading single-lens 3D camera technology. Beneficial features With a complete reference design based on the Qualcomm® Snapdragon™ 888 5G Cellphone Platform, smartphone manufacturers can benefit from dramatic enhancements in-depth map resolution for front-facing applications like enhanced face authentication, and rear-facing applications including 3D reconstruction, enhanced bokeh, one-shot macro photography with 3D-reconstruction and printing of small objects and augmented reality (AR). Qualcomm® Platform Solutions Ecosystem Program photonicSENS' single-lens 3D depth sensing solution will be a game-changer for smartphones" PhotonicSENS is part of the Qualcomm® Platform Solutions Ecosystem Program, which enables software and application vendors to pre-integrate and optimize solutions to create a premium user experience and feature differentiation for OEMs. "photonicSENS' single-lens 3D depth sensing solution will be a game-changer for smartphones," said, Ann Whyte, President of photonicSENS. Single-lens apiCAM technology "The 3D depth camera reference designs of this collaboration are based on our single-lens apiCAM technology that with a single device delivers simultaneously an RGB image and depth map to offer smartphone manufacturers the means to differentiate with enhanced photographic features, a 1.4Mpx depth map, the lowest component count, lowest cost and the lowest power dissipation, as well as the best performance in any environment.” “Snapdragon 888 is a clear leader, and we are excited to be working with Qualcomm Technologies to release our cutting-edge 3D sensing solution to market." Availability photonicSENS is presenting the reference design at Mobile World Congress 2021 in Barcelona, Spain from 28th June to 1 July in Hall 3 (3H52MR).
The Security Industry Association (SIA) has announced the 2021 winners of the SIA New Product Showcase Awards, the flagship awards program presented in partnership with ISC West recognizing innovative security products, services, and solutions. Top among the winners – who were recognized June 17 during a virtual awards show – was Lumeo, receiving the 2021 Best New Product Award. SIA New Product Showcase Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2021, following significant deliberations, the 35 judges presented awards for technologies covering 25+ product and service categories. The 2021 SIA New Product Showcase entries will be on display July 19-21 in Booth 14073 on the ISC West show floor. Best new product Lumeo received the Best New Product honor for its Lumeo product, submitted in the Emerging Technologies category. Lumeo received the Best New Product honor for its no-code video analytic builder “Lumeo is the first and only ‘no-code' video analytic builder that provides integrators, software vendors, and solution providers with the ability to create and deliver custom analytics in minutes and with no technical skills needed,” said Lumeo. “Using drag-and-drop tools, pre-built analytic building blocks, and AI models, Lumeo lets providers instantly add AI-powered analytics to their own solution, or extend existing VMS and camera installations to increase revenue and bottom line. Lumeo’s cloud-managed analytics can run in the cloud, on-premises, or a hybrid model so you can optimize for convenience or cost.” Judges’ Choice Award The prestigious Judges’ Choice Award was presented to Teleportivity for the QR Video Intercom product, submitted in the Emerging Technologies category. “Imagine being able to install an app-like ‘video intercom’ experience, anywhere, simply with a QR code,” said Teleportivity. “There’s no hardware needed, and no app required for the visitor. Simply scan with a smartphone and access. Intercom owners can add a whole range of other self-serve experiences into their code. Install onto a digital directory, letterbox, a door, a wall…Anywhere.” New ideas and technologies “The 2021 entrants to the SIA New Product Showcase are a remarkable group, and we were impressed by the many notable ideas and new technologies that came in this year,” said Christopher Grniet, chair of the SIA New Product Showcase Committee. “It was a challenge making the final award determinations in this year’s highly competitive program following hours of panel-driven judging and technology demonstrations. Thank you to our dedicated judges for volunteering your time, expertise, and efforts to make the 2021 SIA New Product Showcase a success.” Merit Award SIA New Product Showcase program – received the New Product Showcase Merit Award Additionally, Marc R. Tardiff – founder of MRT Security Consulting LLC and an active volunteer judge in the SIA New Product Showcase program – received the New Product Showcase Merit Award, which recognizes an individual or company who, through their support of the New Product Showcase, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. “I am honored to be named the 2021 SIA NPS Merit Award winner and would like to thank Sandra Jones, who first gave me the chance to serve on the SIA NPS Committee, as well as SIA, Reed, and our NPS Committee members for the work that has been going on for quite some time,” said Tardiff. “I’d also like to thank our previous chair, Jennifer Martin, and current chair Chris Grniet for allowing me to continue to serve.” Recognizing all the honorees “SIA is thrilled to recognize the 2021 SIA New Product Showcase honorees, whose products, services, and contributions represent the most innovative new security offerings on the market,” said SIA CEO Don Erickson. “SIA congratulates all the 2021 award winners, and especially Lumeo and Teleportivity, whose solutions stood out among the impressive field of entrants to earn the Best New Product and Judges’ Choice honors. Additionally, we congratulate Marc R. Tardiff on being named the 2021 SIA NPS Merit Award recipient in recognition of his dedication and valuable contributions to this flagship awards program.” Winners of the 2021 Product Showcase The 2021 SIA New Product Showcase award winners are: Best New Product Award Winner: Lumeo – Lumeo Judges’ Choice Award Winner: Teleportivity – QR Video Intercom New Product Showcase Merit Award Winner: Marc R. Tardiff, founder, MRT Security Consulting LLC Category Awards Access Control Devices & Peripherals Hardware – Wireless Winner: Master Lock – Master Lock Vault Enterprise Bluetooth Door Controller Honorable Mention: Bird Home Automation GmbH – DoorBird D1812 Access Control Software, Hardware, Devices & Peripherals – Wired Winner: Honeywell International Inc – Pro-Watch Integrated Security Suite Honorable Mention: Alvarado from dormakaba Group – MST-TE Touch-Free Full Height Turnstile Anti-Terrorism/Force Protection Winner: Bullistic Barriers LLC – RaDeBuRe Commercial Monitoring Solutions Winner: Evolon – Verify Honorable Mention: Optex – Optex 12 Channel Bridge Communications and Networking Solutions Winner: M2M Services – MINI-LTE-M-AV Convergence and Integration Solutions Winner: BioConnect – BioConnect Enterprise 5.0 Design, Diagnostic, and Installation Tools Winner: Axis Communications, Inc. – AXIS Plugin for Autodesk Revit Emerging Technologies Winner: Teleportivity – QR Video Intercom Honorable Mention: Lumeo – Lumeo AiP Monitoring – SafeAtHome App Environmental Monitoring Systems Winner: IPVideo Corporation – HALO 2.2 Fire/Life Safety Winner: NOTIFIER by Honeywell – Notifier Inspire Self-Test Smoke Detection Hosted Solutions/Managed Services Winner: Soloinsight Inc. – CloudGate SmartSpace Identification Management and Credentialing (Non-Biometrics) Winner: SISCO – ThermalPass Intrusion Detection and Prevention Solutions (Physical) – Wired Winner: OPTEX Inc. – Redscan Pro Intrusion Detection and Prevention Solutions (Physical) – Wireless Winner: Intelligent Automation, Inc. – ARGUS Perimeter Security Solutions Key/Equipment Assets Management Solutions Winner: CyberLock Inc. – CyberAudit-Web 9.4 Law Enforcement/Public Safety/Guarding Systems Winner: Active Guardian – 3xLOGIC Gunshot Detection Lock and Key Solutions Winner: Medeco Security Locks – Medeco 4 High-Security Key System Cellphone Solutions (Connected) Winner: IronYun Inc. – Vaidio Cam App Smart Home Solutions Winner: Alarm.com – Flex IO Honorable Mention: 2GIG – 2GIG EDGE Security and Automation Panel Threat/Risk Management Software Applications Winner: Gallagher – Proximity and Contact Tracing Report Video Analytics Winner: IronYun Inc. – Vaidio AI Vision Platform 5.0 Video Surveillance Cameras (HD/Megapixel) Winner: Hitachi Kokusai Electric, Ltd. – KP-HD3005G-R5/IF-PCB Video Surveillance Data Storage Winner: Premio Inc. – AI Edge Inference Computer (RCO-6141E-4U2C-2060S) Video Surveillance Management Systems Winner: Immervision Inc. – Immervision HTML 5 Web SDK During the 2021 SIA New Product Showcase virtual awards ceremony, in addition to the presentation of the overall and category-specific awards, attendees enjoyed hearing insights from New Product Showcase judges into innovations driving product advancements in the security industry. The 2021 SIA New Product Showcase entries will be on display July 19-21 in Booth 14073 on the ISC West show floor.
Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond normal expectations. SALTO Systems has invested years of working with some of the best minds in the security industry, their community of security specifiers and installers, to build the most reliable and smartest electronic padlock on earth. SALTO Neoxx Padlock With exceptional attention to detail, premium materials, and all SALTO technology inside, their latest padlock, SALTO Neoxx, looks great while packing technological power. The SALTO Neoxx Padlock is a versatile locking solution that enables users to benefit from the advantages of electronic access control, where previously it was only possible to use a mechanical locking solution (i.e., perimeter or fire access gates, industrial equipment yards and residential storage areas). Smart padlocks for enhanced security Smart padlocks offer more security, easier maintenance and flexible access methods Smart padlocks offer more security, easier maintenance, flexible access methods, and a better overview of the lock’s and user’s activity. As portable as conventional padlocks, security is enhanced by removing any lock’s most vulnerable part, the mechanical key and adding the benefits of being operated with a mobile app and contactless smart key, managed by an advanced web-based access control technology platform. The SALTO Neoxx Padlock offers a unique solution, ideal for utility providers, electric power stations, telecom network services, industry applications, and more, along with property services that need an additional level of security to control specific doors, like gates or storages, without losing a piece of convenience and control. Advanced electronic access control technology These industries often require equipment and facilities on the perimeter or out in the field that, even though they are in a remote location, require the latest in electronic access control. And because they are often outdoors, the electronic solution they need has to include a product that can weather the extreme elements from rain and dust to snow. Built to withstand the most extreme weather, the Neoxx is IP68 certified for waterproof performance and high durability. Remote management of keys, locks and access rights Together, with the most complete locking platform on the market (electronic locks and cylinders, online readers, and locker locks) and SALTO core technology (SVN, BLUEnet, and JustIN Mobile system features) inside, the SALTO Neoxx padlock enables managing keys, locks, and access rights on-the-go, remotely from a single, highly visual and easy-to-use web-based interface. SALTO Neoxx G4 electronic padlock’s main features include: High-security padlock made of hardened steel with a removable shackle model option, which can be completely detached from the padlock body. Shackle: Width 11mm - Length 50mm. Security chain non-demountable model with safety chain to protect the padlock from burglary/dropping. Cover case with double-layered structure 70mm x 115mm x 32mm guarantees the ultimate protection from falls, shocks, and the most extreme environments or usage. RFID, BLE (Bluetooth Low Energy) and NFC technologies onboard. Users can easily operate the electronic padlock with their smart card or with an iOS or Android smartphone. Compatible with SALTO Space – Data-on-Card– and the SALTO KS – Keys as a Service – cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. Tested up to 130,000 operations on a standard set of batteries (4 x LR1). Monitor battery status (to optimize maintenance and battery life). Changing or removing batteries is simple and secure – users only need standard LR1 batteries and a special tool. IP68 certification: Waterproof performance and high durability. Tested against extreme temperatures: Including freezing conditions (-35ºC) and high heat (+65ºC). Fully certified according to CE, FCC, MIT, Mechatronic certification EN 16864:2018 and IK09.
2N, internet-enabled intercoms, and access control systems company, has launched the new 2N® IP Style intercom with a next-generation platform supported by an Axis processor. Sleek design with a touchscreen display The 2N® IP Style sets new standards in access control simplicity, performance, and aesthetic appeal, and will meet the specific needs of owners of modern residential and office buildings. 2N® IP Style’s attractive, large 10” touchscreen LCD provides a complete, detailed view of incoming visitors. To ensure its durability, it is protected by scratch-resistant 4-mm tempered glass. Users will also benefit from the ‘smartphone-style' touchscreen display with instant response and smooth animations. In another breakthrough, the 2N® IP Style has also been designed to deliver different office and residential screen capabilities in one. In this way, it can meet the differing needs of commercial office and luxury developments. Visitor identification via WDR technologies The 2N® IP Style gives the building owner or user all the decision-intelligence they need at their door Drawing on the processing power of Axis’ Artpec 7 chip and the flexibility benefits of edge IP devices, the 2N® IP Style gives the building owner or user all the decision-intelligence they need at their door. Because of this new chipset, the intercom platform can handle multiple simultaneous full HD streams and provides a full-color picture without any artificial light. Its 5MPx camera’s incorporation of Wide Dynamic Range (WDR) technologies ensures full image quality and identification of the visitor, even in darkness or uneven lighting conditions outside. In these ways, this intercom sets a new benchmark for ease of use and building security. Fast and easy access control Based on feedback from security and installation companies, 2N has also developed a new installation mechanism for the new intercom. The patented tilt-out system allows installers to use both hands to work with the cables, making installation faster as well as easier. Michal Kratochvíl, CEO of 2N Telekomunikace, said, “The 2N® IP Style revolutionises access control for modern apartments and office buildings. The intercom incorporates the best camera, the best video transmission, and display, and has a quality user interface which can be activated by a simple tap of a smart device – all wrapped in a timeless design.” WaveKey access technology The new intercom unit allows faster and simpler access because it supports the widest range of access control technologies – including the latest and fastest Bluetooth-enabled mobile access technology, WaveKey, as well as all card technologies. It also has a smart PIN keypad. With WaveKey access technology implemented in the intercom, the 2N® IP Style supports Touch, Tap in App, and Motion modes. The Motion mode means that if a user has an authorized application on their mobile device, the unit’s camera registers any movement from that person in a 170° field of view and automatically opens the door. High building security & easy access With a certification of IP65 and IK08, the 2N® IP Style is well suited to outdoor and harsh environment applications Michal Kratochvíl added, “Developers and users of luxury homes and high-end offices expect the highest standards in building security and ease of access. We are meeting, and indeed exceeding, these needs with the new 2N® IP Style, which redefines the performance, capabilities, and aesthetic appeal of access control units.” “The new intercom draws on our 30-year record in access control unit design and unrivaled expertise in open standards integration. Through that commitment to cutting-edge devices and setting industry benchmarks, the 2N® IP Style brings together the power of Axis’ Artpec 7 processor, beautiful glass panel housing, and the speed and simplicity of Bluetooth with WaveKey access technology.” “We believe the 2N® IP Style will become the intercom of choice for forward-looking developers for many years to come. Applications The 2N® IP Style unit is designed and manufactured with a commitment to open protocols so, as with other intercoms from 2N’s portfolio, it can be integrated with the best in high-performance third-party systems. Manufactured in the Czech Republic from hard-wearing materials, and with a protection certification of IP65 and IK08, the 2N® IP Style is well suited to outdoor and harsh environment applications.
As lockdown restrictions ease and public mobility increases, new research reveals three-quarters (75%) of people have health, safety, and security concerns when visiting their nearest city, signaling a need for new security innovations and greater public reassurance on their return to UK cities. Following high profile cases such as the disappearance of Sarah Everard, the London Bridge terror attack, and recent road cyclist deaths, the public has a heightened awareness of the safety and security issues cities present, according to a new report into public perception of smart cities by video management solution provider Milestone Systems. Security concerns in the city Despite ONS reporting a total crime reduction of 4% in England and Wales in the 12 months ending in June 2020, more than a third (37%) of the British public cited petty crime, such as mugging and pickpocketing, as a security concern when in a city setting. One in four (25%) Britons stated vandalism is a primary concern for them, and a similar proportion (24%) listed pedestrian safety as a worry when navigating their nearest city. Terrorism threat Although the UK's terrorism threat level was downgraded from "severe" to "substantial" in February 2021 by Home Secretary Priti Patel, following a "significant reduction" in the momentum of attacks in Europe, terrorist activity remains a worry for almost a fifth (17%) of the public. Terrorism was of markedly less concern to those over 65 than any other age group (8% vs average of 17%), but for all other safety concerns, there was a surprising consistency across both age groups and genders. Improving safety and security The existence and benefits of smart technology in cities needs to be better communicated to the public To mitigate these concerns, smart technology is already being deployed in cities across the world to improve safety and security. Increased bandwidth afforded by the rollout of 5G and the internet of things has given local authorities new tools to improve public services such as crime-fighting. In Glasgow, for example, there is an effective multi-faceted state-of-the-art traffic and public safety management system that uses data and video analytics to improve responses to issues in the city, but Milestone’s research suggests that the existence and benefits of smart technology in cities needs to be better communicated to the public. Smart city technology Neil Killick, UK General Manager at Milestone Systems said, “Many local authorities have been investing heavily in recent years in cutting-edge smart technology to improve public services and tackle safety and security concerns highlighted by our report. However, the research found that less than a third (29%) of people say that they believe smart city technology could contribute to enhanced safety and security.” “This demonstrates a need for more public education around how smart technology improves safety in cities and also suggests that local authorities need to continue to find new ways to improve day to day life for their city’s residents and visitors.” “The sector is advancing rapidly and products are available to tackle a wide range of city-based safety concerns so it is important to improve understanding so that citizens give their full support to smart city technology and feel safer and more confident when in urban areas.” Public awareness Increasing the public’s awareness of technology advancements for safety purposes must be done in a way that demonstrates its benefits. Developments such as limiting video network blind spots, improving poor-quality images, and supplementing visuals with data collected from interconnected devices, give law enforcement more reliable and thorough data to use in investigations. Thus, enabling instances of theft and civic disturbances to be monitored, reacted to more rapidly, and prevented, curbing the safety concerns of the public. Traffic management systems Department for Transport figures reveal the vast majority of accidents occur in towns and cities Also among the top five concerns for the public when returning to UK cities was driver safety (17%). Department for Transport figures reveal the vast majority of accidents occur in towns and cities, with 2,881 accidents per 1 million people happening in the capital city region, higher than any other region. One in six (14%) Britons cite cyclist safety within their top concerns when returning to the UK’s busy cites, supporting London Mayor Sadiq Khan’s plans for 160 miles of 'safer cycle routes. However, London’s low-traffic neighborhoods (LTNs) have come under criticism from the emergency services who state the new traffic management systems have reduced response times. This suggests that alternatives are needed to balance the needs of the public and of emergency services, such as smart sensors and cameras that collate real-time data to detect the quickest and most traffic-free route for emergency vehicles to take. Smart video and sensor technology Neil Killick continued, “As well as helping to protect the public in the context of crime, smart video and sensor technology can be used to manage traffic and roads within cities, reducing congestion and providing local authorities with constant, real-time analytics, as seen in Glasgow.” “This enables relevant authorities to identify potential danger spots, manage roads and bike lanes within a city and plan optimal emergency service routes. The use of interconnected devices, sensors, and video technology allows for a deeper understanding of how the city is being used so that necessary improvements can be implemented based on data-driven decisions to better public safety.”
SALTO Systems, a manufacturer of electronic access control solutions, has named Ron Shaffer as the North America Vertical Business Leader-Education. "From my first day in 2006 to now, SALTO continues to be a technology leader within the world of access control. I have held many positions during my time with SALTO and am still amazed with the depth of SALTO’s product line, attention to detail, and commitment to research and development. I’m excited to be part of the next phase as vertical business leader for K-12 and higher education," said Shaffer. Access control positions SALTO North America Director of Marketing & Vertical Business, Steve Burk, said access control for education not only makes students, staff, and campuses more secure, it will also drive operational efficiencies, not to mention that it can also be a very attractive draw for students and staff. Ron’s technological knowledge of access control positions him well to be the customer’s trusted adviser" “Ron’s technological knowledge of access control positions him well to be the customer’s trusted adviser and to develop solutions for them that deliver the value they expect. We look forward to great things from Ron as we expedite our growth in this important vertical.” Access control positions Shaffer has previously served SALTO as a Business Development Manager and Solutions Architect Technology Director. Prior to joining SALTO, Shaffer was a Training and System Implementation Manager for Onity and a Technical Onsite Trainer for TESA Entry Systems. He has earned management certification from Emory University; network & communications management from Devry Institute of Technology; and A+ computer certification and network+ certification from New Horizons Computer Learning Centers.
If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organizations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points, and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient, and extremely user-friendly. More and more businesses are realizing the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organizations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-Time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control center that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualization tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focusing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customization of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organized to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyze data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
The City of Mecca selected E-vision to deploy its innovative waste collection solution alongside 15,000 rugged Micro X-II RFID tags from Xerafy activated in the field. The Saudi Arabian city of Mecca has deployed Xerafy’s Micro X-II RFID tags to successfully manage thousands of waste collection bins. Using Xerafy’s rugged tags and a software solution from E-vision, the city now has real-time visibility into its waste collection activities and vehicle fleet. Mecca was looking for a way to track the status of waste bins as well as the location of its waste collection vehicles. To better service customers, the city wanted to be able to confirm that each trash bin had been emptied into the collection vehicle, enable automated electronic communications from the trucks to the operations office, and minimize human intervention in data collection activities. RFID-based waste management solution Mecca selected the RFID-based waste management solution from Riyadh-based E-vision. The company provided its innovative Waste Collection solution, along with rugged tags from Xerafy, a customized GPS tracking device, and RFID readers from ThingMagic. Mecca is leveraging several modules of E-Vision’s waste collection software, including complaint management, fleet management, tracking, and other customized services. E-vision also created a communication board to manage the hardware tracking functionality. “Waste collection is a challenging environment for data collection,” said Tarek Fawaz, Technical Manager at E-vision. “Xerafy has provided us with RFID tags that are uniquely suited to the environment in Saudi Arabia, and that is rugged enough to resist the shock and vibration the waste bins are exposed to.” Real-time tracking Mecca and E-vision are developing a new device with a built-in RFID reader to improve data collection and software user interface Mecca can track which containers have been emptied and when, and can also track and manage its vehicle fleet in real-time. Using the complaints management module, customers and supervisors can record any problems or violations via cellphone app, and submit the issue to the company as well as track and confirm resolution. Managers can also monitor performance and generate a wide variety of reports based on the RFID data. With the system successfully in operation for nearly three years, Mecca and E-vision are developing a new device with a built-in RFID reader to improve data collection, as well as enhancing the software user interface and redesigning the software architecture in preparation for a transition to cloud hosting.
Embracing the benefits of touchless access using smartphones, Vanderbilt University expanded its investment into campus safety and security, by leveraging HID Mobile Access to deploy campus IDs on iPhone and Apple Watch via Apple Wallet. The enhancement builds upon the university’s initial investment in mobile-enabled technologies from HID Global. These technologies capitalized on the ubiquitous nature of smartphones and mobile devices among students, 90 percent of whom reside on campus throughout their Vanderbilt education and faculty, to create a campus-wide identity and access management program. HID Mobile Access The investment continues to pay dividends. “Keeping students safe is our top priority. HID Mobile Access was the optimal solution for protecting students and allowing Vanderbilt to move to a mobile solution for securely accessing our campus and services. The integration of campus IDs on iPhone and Apple Watch brings added convenience for our entire campus community,” said Mark Brown, Director of Business Services Technology with Vanderbilt University. Mark Brown adds, “Beyond the convenience and security, two very important considerations, this mobile solution gives us the freedom to provision and modify credentials remotely, which has been significant for protecting the health of our students and staff, during the worst of the COVID-19 pandemic in 2020.” Compatible with NFC and Bluetooth technologies Vanderbilt initially tapped HID Global to implement a mobile credential solution compatible with NFC and Bluetooth Vanderbilt initially tapped HID Global to implement a mobile credential solution compatible with Near Field Communication (NFC) and Bluetooth technologies. HID Mobile Access, powered by Seos credential technology, was deployed alongside a reader infrastructure, comprising HID Signo Readers, HID iCLASS SE readers, and OMNIKEY desktop readers, in order to manage access to buildings. It complements the ecosystem by facilitating the usage of the already issued credentials for all other adjacent use cases. The solution allowed Vanderbilt administration to issue mobile credentials that let students, faculty, and staff access buildings and services with their mobile devices, as well as efficiently provision/de-provision credentials remotely, without person-to-person contact. HID Reader Manager Next, the university wanted to add support for credentials in Apple Wallet, without compromising the existing access infrastructure or its security. This was easily accomplished by using HID Reader Manager to upgrade firmware on the university’s physical access control readers, so as to extend support for NFC-based credentials in Apple Wallet. The university uses the flexible HID Origo Mobile Identities API integrated with CS Gold, a higher education transaction system from CBORD, for credential lifecycle management. Commodore campus ID cards With campus IDs in Apple Wallet, students can complete any action that would have previously required a physical ID card, both on and off campus, with just their iPhone and Apple Watch. Students simply present their device to a reader to enter dorms, libraries, and fitness centers, buy lunch, make purchases at campus stores, and pay for laundry, print documents, and more. The university’s Commodore campus ID cards on iPhone and Apple Watch provide an extra level of security The university’s Commodore campus ID cards on iPhone and Apple Watch provide an extra level of security and privacy, so students do not need to worry about misplacing their physical card, when they are enjoying campus life. Transaction history is never shared with Apple or stored on Apple servers. If a student misplaces their iPhone or Apple Watch, they can use the Find My app to immediately lock their device and help locate it. Safe and secure mobile access solution HID Global is pleased to support Vanderbilt University in achieving its goal of delivering a safe, secure, and convenient mobile access solution, with the added flexibility of supporting the Apple Wallet platform. With integrated HID Mobile Access, issuing credentials to new users is as easy as having them download the app, validate identity, and seamlessly add their credentials to Apple Wallet.
An American sports broadcasting network wanted to modernise to an IP communication solution without disrupting its 24/7 operations. The organization was relying on a digital phone system that was obsolete and becoming increasingly inefficient and costly. However, the existing phone system was supported by a single-pair UTP infrastructure that was not ready to support the new IP devices. While the customer wanted to modernize to IP, they were not interested in the risk, complexity, and business disruption that would result from ripping out the existing infrastructure and replacing it with new CAT5/6 Ethernet cabling. Need for cost-effective solution Strict company policy mandated 24/7 operational uptime, which meant there was no allowance for the disruption that the re-cabling would cause. The network needed an innovative solution to overcome its infrastructure barriers and complete its digital transformation Additionally, the enormous cost associated with infrastructure requirements was not in the budget’s scope, creating additional barriers and challenges to deploying the new IP communication solution. The sports broadcasting network needed an innovative solution to overcome its infrastructure barriers and complete its digital transformation project. PoLRE switch The customer’s IT Director met with the NVT Phybridge team at an industry event and discovered the PoLRE® (Power over Long Reach Ethernet) switch. The enterprise-grade PoLRE switch delivers fast Ethernet and PoE over single-pair UTP cable with up to 1,200ft (365m) reach; that’s four times the reach of standard Ethernet switches. The IT Director was impressed with the technology and organized a proof of concept to test the solution in a live environment. Features and benefits After a few simple setup steps, the PoLRE switch transformed the customer’s existing and proven single-pair UTP infrastructure into a robust Power over Ethernet network to support the new IP communication solution. After experiencing the features and benefits of the PoLRE switch first-hand, the customer was confident that the technology would overcome the digital transformation barriers. “The NVT Phybridge PoLRE® switch is a pretty straightforward process. The big advantage for us was delivering outstanding service, which was critical for the success of the project,” said Richard Smith, Product Sales Specialist, GSP America. Saved costs on digital transformation The customer significantly accelerated its digital transformation project by deploying the new IP solution The sports broadcasting network saved over $500,000 in infrastructure costs using the NVT Phybridge PoLRE switches. The customer significantly simplified and accelerated its digital transformation project, deploying the new IP communication solution without disrupting its regular business operations. The PoLRE switch’s extended reach capabilities simplified LAN design and ongoing network management, as the customer was able to support the new IP phones exactly where they were needed without additional IDF closets. “It’s a pretty straightforward process,” said Richard Smith, Product Sales Specialist, GSP America. “The big advantage for us was delivering outstanding service, which was critical for the success of the project”. The customer was able to avoid the traditional rip-and-replace upgrade method, using Modern LAN principles to improve the outcome of the project significantly.
It can be a challenge to find an ideal electronic lock for every opening, and then to manage them all within a single, integrated solution. All too often, security procurement involves difficult compromises: A system that works perfectly for one door or department leaves another where the same solution doesn’t quite meet its needs. Range of access control solutions A newly built commercial premises in Banská Bystrica, Slovakia, power-tool manufacturer Makita stocks and distributes batteries, and runs wholesale supply logistics. They searched for a single, intuitive system to control every access point — now and in the future. Yet, as at many other sensitive commercial sites, not every door or opening is the same. Makita needed an access control solution with a comprehensive range of devices — to secure escape doors, entrances, interior doors, and more. “The diversity of access control devices available for the Incedo™ system was a decisive factor,” says Makita’s Richard Cimerman. Device management from a single system Makita Slovakia has a totally flexible, futureproof Incedo access solution designed to grow with their business ASSA ABLOY Opening Solutions’ Incedoä platform connects security software and hardware within a single, seamless ecosystem. The range of Incedo-enabled devices and award-winning door hardware convinced Makita — for this site and for future premises and refurbishments around Slovakia. The new Banská Bystrica facility has an Incedo system controlling access through main entrances, fire doors, and emergency exit doors, as well as interior doors fitted with Aperio® wireless electronic escutcheons. User-friendly Incedo Business software manages and monitors everything together from a single control panel. It filters and restricts employee and visitor access to specific areas of the plant. Secure key credentials The modular, platform-based Incedo solution incorporates wired and wireless door locking devices from across the ASSA ABLOY range; card, token and secure cellphone key credentials that can be used interchangeably; and a growing range of third-party security solutions. Should Makita upgrade to Incedo Plus management in the future, their own system could manage CCTV and alarms alongside access and door entry. When security demands change at Makita Banská Bystrica, their Incedo system can adapt. With Incedo software, Makita can switch between local and Cloud managed solutions whenever they choose. System size is scalable up or down, anytime and on-demand, as security needs or space usage change. Makita Slovakia has a totally flexible, futureproof Incedo access solution designed to grow with their business.
McKinney ISD relied on an aging analog phone system that was out-of-date, end-of-life, and no longer supported. The school district wanted to upgrade to an IP communication solution across 37 separate buildings. The school board already had a Fiber backbone that connected each of the buildings. However, the IP devices would also need power, meaning every classroom would require an MDF closet. This solution was not viable due to high costs, network complexity, network security, and safety concerns. Additionally, many endpoint locations were well outside the 330ft (100m) reach limitation of standard switches. McKinney ISD considered laying new cable, but the $1.1 million price tag was far too high, the deployment times too long, and the project’s return on investment in jeopardy. The school district needed an innovative solution to modernize communication within the defined budget and time frame. Solution NVT Phybridge PoLRE switch delivers Ethernet and PoE over a single pair of UTP wire with up to 1,200ft (365m) reach Due to the school district’s challenges, Cisco suggested the PoLRE switch to overcome the digital transformation barriers. The NVT Phybridge PoLRE switch delivers Ethernet and PoE over a single pair of UTP wire with up to 1,200ft (365m) reach, which is four times the reach of standard switches. Cisco was confident in the PoLRE switch and coordinated with NVT Phybridge subject matter experts to present a tailored solution to the customer. McKinney ISD registered for a free, no-obligation proof-of-concept to test the PoLRE switch in its environment. After a few simple setup steps, the PoLRE switch transformed the existing single-pair UTP cabling infrastructure into a power-packed IP backbone with more than enough bandwidth to support the Cisco IP devices. The school district was impressed with the solution and told its technology provider, CDW, to incorporate the PoLRE switch into the proposal. Result McKinney ISD took a proactive approach to find new and better ways to achieve its digital transformation goals without high costs, complexity, or disruption. CDW used the NVT Phybridge PoLRE switch to deploy over 3,300 phones without ripping and replacing the existing and proven voice infrastructure. Deploying across the 37 locations was quick and straightforward thanks to the PoLRE switch’s repeatable, predictable, and scalable deployment methodology, which further increased time and cost savings for the customer. Authority Comments The PoLRE switch allowed to modernize without having to deal with the construction “Deployment was quick and simple for the installation team,” said Jeannie Newman, Central US Sales Manager, NVT Phybridge. “Our Technical Support Team did an amazing job assisting with configuration over the phone.” “The installation was really smooth,” said David Spann, CIO, McKinney Independent School District. “The PoLRE switch allowed us to modernize without having to deal with construction. We did our homework. Re-using our existing cabling and turning it into a more secure transmission model was a huge win for us and a huge win for our taxpayers. This really was a win for everyone.” McKinney ISD used the PoLRE switch to achieve incredible results: Reduced infrastructure costs by more than $1.1 million Reduced the total deployment time by three years Avoided putting IDF closets in the classrooms Prevented over 10 tons of cabling e-waste
SmartSec Solutions, a specialist front of house security provider, has been appointed by Colliers International to oversee security at the prestigious 10 Old Bailey, London. SmartSec has been working with Colliers for almost three-years across other London-based properties including at Idle Lane, Southampton Street, King Street, and Bartholomew Lane and this appointment adds to SmartSec’s growing corporate portfolio. High-Profile security service The three-year contract, will see SmartSec provide high-profile security service The three-year contract, starting in May 2021, will see SmartSec provide high-profile security service to welcome tenants and visitors as well as protecting assets, property and the occupiers. 10 Old Bailey is an eight-storey building across 86,625sq ft. St Paul’s Underground station is within 5 minutes of the building providing access to the Central Line. Thameslink and Blackfriars are also in close proximity. Solid customer service Rachel McMahon, Colliers International Facilities Manager, said: “SmartSec’s staff are fantastic. They are great communicators and have always displayed that wow-factor. I know that I can approach Dele Ogunlaru and his team and speak openly and candidly to them. This personalized service is invaluable to Colliers and is what separates SmartSec from any other security provider I have previously worked with.” Dele Ogunlaru, Director, Compliance & Key Accounts, comments: “First class security underpins everything. However, it’s also about solid customer service, good communication, and welcoming building tenants and visitors coming through that front door. We are the first person they see at the start of the day and often the last person they see when they leave. It’s about making a visit to the building an enjoyable experience, and that starts with the officer on the front desk.”
Round table discussion
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerized systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Choosing the Right Storage Technology for Video SurveillanceDownload
Video Surveillance As A Service: Why Are Video Management Systems Migrating to the Cloud?Download
Top 5 Ways to Ensure Visitor Safety and SecurityDownload
exacqVision 21.09 WebinarDownload