Office security systems
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddli...
CyberCube, a cyber analytics provider, has completed its Service Organization Control 2 Type II (SOC 2® Type II) audit report. The report is based on an examination of CyberCube’s internal controls and procedures. CyberCube is committed to exceeding critical compliance standards for its customers. A SOC 2 Type II report assures its clients that the company meets the suitability of design and operating effectiveness of applicable controls. Information security policies SOC 2 Type II...
FLIR Systems, Inc. announced availability of the FLIR Occupancy Management Solution for FLIR Brickstream 3D Gen2 to automate occupancy counting within high traffic and capacity-limited areas. To support social distancing guidelines during and following the COVID-19 pandemic, the Occupancy Management Solution provides organizations with an easy-to-use, real-time capacity counting and display tool for multiple entries and exits. Organizations can automate capacity counting for high foot-traffic s...
TrackTik Software, the cloud-based security workforce management solution based in Montreal, Quebec, is proud to announce its recent partnership with Rain Instant Payment, a voluntary employer-sponsored benefit, that provides financial wellness tools, and allows employees access to a portion of their wages before payday through its app. With security guard turnover rates reaching as high as 400% in the security industry, it’s important for security companies to be able to offer financial...
Synology Inc. announces the availability of the DS220+ storage system, an ideal starting point for many home and small businesses to start consolidating and securing their data. DS220+ at a glance: 97% faster in website responsiveness1 17% faster in compute-tasks1 Up to 32 TB raw capacity Dual 1GbE ports Compute performance improvement DS220+ is available from Synology resellers and partners in Europe, joining the rest of the company’s 20-series lineup. Performance figures are b...
Reducing the spread of germs and bacteria has never been more essential in the current climate. Holding open internal doors provide an easy and effective method of infection control within the building, but it is important that this does not impact the user’s fire safety. A study by the New England Medical Journal, which researched the survival of coronavirus on a number of surfaces, identified that the virus was still detectable on hard surfaces such as plastic and stainless steel 72 hour...
The potential for a hacked tweet from a senior business figure’s account to move a company’s share price was highlighted on Wednesday after a dozen high-profile celebrities had their Twitter accounts hijacked. Darren Thomson, Head of Cyber Security Strategy for cyber analytics leader CyberCube, said that a sophisticated social engineering attack had been used by the criminals to gain access to Twitter’s own systems. According to Thomson, the outcome of the attack was not as serious as it could have been. Latest estimates suggest over $100,000 has been lost by individuals sending bitcoins in response to fake messages offering to double their money. Homeworking creating cyber-vulnerabilities Thomson said: “This attack highlights two key points. First, CyberCube’s recent report on the effects of the pandemic found that homeworking was creating new avenues for criminals to use in their attacks. In this case, the Twitter employees whose accounts were compromised were working from home, where it may have been easier for criminals to manipulate their targets.” “The confluence of COVID-19 and advance social engineering techniques poses a growing threat. Second, it shows just how much influence high-profile figures’ accounts have. We’ve already seen how genuine tweets from the likes of Elon Musk can affect a share price. One can foresee a similar kind of attack whose objective is primarily to damage a business’s market valuation or its reputation. There’s the potential to do real harm to an organization here. Perhaps of even greater concern is that potential political consequences of a world leader’s social media account being compromized.” More cyber-attacks could be expected The CyberCube team said more of this type of attack should be expected, particularly if this hack was a test by criminals. CyberCube is the cyber risk analytics company for the insurance industry. Its analytics platform allows insurance businesses to analyze what a major cyber-attack and other cyber-related scenarios would have on a portfolio of insurance risks.
Midlands-based firm, Ecl-ips, is using its expertise in providing monitoring, CCTV and access control, to offer organizations a range of back to work solutions to keep customers, visitors and staff safe as the company continue to mitigate the risks from COVID-19. Occupancy Management Solutions With more businesses opening up Ecl-ips can help occupancy counting to ensure social distancing is maintained. Ecl-ips can offer Avigilon’s occupancy counting feature, as part of its video management software and Avigilon Cloud Services (ACS). Through the use of advanced technology, the occupancy counting feature provides an easy and streamlined way to count and identify the number of people in a building. Ecl-ips can also offer Paxton’s access control system Net2. Paxton has added an occupancy management feature to the software. This allows employers or facilities managers to limit the number of people in any given area of their building; either barring access or sending an email/text to the manager when a space nears capacity. It will work across multiple areas of a site and can be set to operate a one in, one out system to support social distancing measures. Remote Access Control Ecl-ips is now able to offer an upgrade of the Net2 software which Paxton unveiled in May. This expanded the ability of facility managers to manage access to buildings remotely reducing the physical contact required for people to enter and leave those buildings but still maintaining their security. This followed the launch of web-based version of Net2 and its Paxton Connect app which meant this software is available wherever the users are. Face Mask and Face Covering Detection The wearing of face coverings is now compulsory in the UK for users of public transports and face masks are either mandatory or strongly advised for staff in a number of workplaces. Additionally, the wearing of face coverings is advised in shops and other indoor places. Avigilon has developed technology to detect if there are breaches in rules associated with the wearing of face masks or coverings. This can provide an alert so security staff or managers and Ecl-ips can customize this solution to provide an audible warning to those committing any breaches of rules. Social Distancing Guidelines Support In its latest software release scheduled for this month Avigilon’s most advanced cameras will identify breaches of social distancing guidance and again this can provide an audible warning. The technology can also demonstrate to those managing commercial spaces or other buildings like schools or healthcare settings where there are potential bottlenecks and so social distancing will be difficult. This will allow managers to make changes within the buildings, for example, by only allowing people to walk in one direction through a corridor to reduce the numbers having to be in close proximity to each other. Contact Tracing Capability Meanwhile, Ecl-ips is also a specialist in Avigilon’s access control system. This can be used with Avigilon’s CCTV system to assist with contact tracing if employees are found to need to isolate after showing symptoms of COVID-19. This is because of the advanced technology providing a record of staff accessing buildings and being able to correlate to video footage of staff on CCTV. Thermal scanning Some organizations are using thermal scanning as part of their solution for opening up businesses by detecting staff or visitors that may have raised temperatures and require health screening. Paxton has made improvements to Net2 to allow installers to integrate the system with thermal scanners more easily. Ecl-ips can also offer thermographic cameras and advise if they are the right solution for the customer. Aaron Kernaghan, Managing Director of Ecl-ips, said, “Ecl-ips is a well-established CCTV, access control and monitoring firm. We are ensuring that we are operating in a COVID-19 secure manner and are keen to assist organizations get back to work safely.”
Renowned temperature monitoring expert, AMETEK Land, has launched a new human body temperature screening system to help prevent the spread of infectious diseases like COVID-19. Developed over 10 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance, scanning for elevated temperatures that could indicate infection. The VIRALERT 3 is the first of its kind, providing a camera and a temperature-controlled reference source on a single mounting. Using automatic face detection, it locates the best areas for temperature detection, taking a reading that’s accurate to within 0.5oC, then calculating core body temperature through a rapid test procedure of approximately two seconds. Thermal imager camera The VIRALERT 3 is easy to use, and can be left to operate automatically, with audible and visual alarms It provides an effective solution for scanning visitors at entry points into hospitals and healthcare facilities, commercial areas, education facilities and public spaces, transportation entry points, offices and manufacturing locations, and sports and leisure sites. Designed to screen visitors at an entry point without slowing the flow of people, the VIRALERT 3 scans temperatures without any person-to-person contact, keeping both parties safe from disease transmission. The VIRALERT 3 is easy to use, and can be left to operate automatically, with audible and visual alarms alerting when high temperatures are discovered. To ensure the highest levels of accuracy and reliability, it has a blackbody calibration source fitted on the same platform as the integrated thermal imager/visual camera. This makes for a compact system that won’t get in the way of queueing people and can be easily wall-mounted. Infrared measurement instruments The VIRALERT 3 builds on AMETEK Land’s proven expertise in temperature technology. The company has been developing high-accuracy infrared measurement instruments since 1947, and has been creating human body temperature screening systems since responding to the SARS outbreak of 2003. Set-up is simple; with no complex software configuration required, the system can be up and running within 30 minutes of delivery.
SonicWall announced it had appointed Tristan Bateup as Country Manager for Ireland, building on the company’s long-established collaboration with distributors in the region as it continues to expand its presence and capabilities in the country. Tristan has over a decade of experience in the cybersecurity industry, including five years managing SonicWall partner business at long-time distributor Exertis. From there, he joined SonicWall, where he served as Strategic Account Manager for the UK and Ireland until his recent appointment in February 2020. Throughout his career, Tristan has helped the IT channel community arm itself with the right technology and services to offer the highest level of protection — laying the groundwork for his new role, in which he is challenged to drive double-digit growth in the region. Chronic skills shortage Will Benton, Regional Director, Northern Europe at SonicWall, said: “Tristan’s experience and skills have already proved invaluable in establishing our presence in Ireland since his appointment. SonicWall places great importance in its partner relationships, and Tristan’s strong experience on both sides of the relationship contributes to bringing us even closer to our partner network in Ireland.” The announcement comes after recent enhancements were made to SonicWall’s MSSP program last April. The program was designed to assist MSSPs in helping their customers bridge the cybersecurity business gap resulting from the expansion of threat vectors coupled with tightening budgets and the chronic skills shortage. Enterprise cybersecurity solutions SonicWall has evolved its Boundless security offering to cover the skills and budget gaps caused" To address the needs of Ireland-based customers in the era of Boundless Cybersecurity, SonicWall will be consolidating its channel strategy in the region, responding to the rising demand for enterprise cybersecurity solutions in the growing Irish economy and the strong competitive market. “Ireland is growing strongly, and that brings security concerns,” Bateup said. “Recently, Irish businesses have had to deal with increasingly insidious threats from cybercriminals while adjusting to a 100% remote workforce. SonicWall has evolved its Boundless security offering to cover the skills and budget gaps caused by just such a scenario. So, joining the team when today's Irish customers need hyper-distributed IT is the right move at the right time." Sales engineering resources SonicWall is also expanding its partner base in order to refine its focus in the Irish market and offer a wider range of solutions to customers. To this end, it is also strengthening its position by establishing additional resources such as dedicated sales engineering resources and field sales. SonicWall, a 100% channel-focused company, has over 20,000 partners worldwide. Partners have the benefit of participating in the award-winning SecureFirst partner program and SonicWall University, designed to educate partners while helping them grow and expand their business. With innovation as well as disruption accelerating across EMEA, it is more important than ever that extensive partner communities fully leverage the wide breadth of solutions businesses offer, from wireless, cloud and endpoint to remote access and more.
Everbridge Inc., the global provider in critical event management (CEM), announced that Siemens, one of the world’s producers of energy efficient technologies and #62 on the 2020 Forbes Global 2000, will adopt the Everbridge CEM Platform to help protect Siemens’ workforce and operations against critical events of all kinds, from the COVID-19 pandemic and political unrest to sudden economic changes and more. The two companies have also formed a technology alliance in which Siemens will share domain know-how, artificial intelligence (AI) and machine learning technology to enhance Everbridge capabilities. Corporate security and incident monitoring and assessment “We are very excited about our shared vision of combining Everbridge’s Critical Event Management portfolio with our own capabilities in the field of data analytics, machine learning and artificial intelligence into one end-to-end platform to keep people safe and operations running,” said Marco Mille, Chief Security Officer, Siemens. “Corporate security executives’ ability to ensure business resilience globally, through fast and bespoke response strategies based on comprehensive and pro-active incident monitoring and assessment, will be a key success factor in the coming years.” Everbridge will enhance Siemens’ capabilities to rapidly pinpoint threats and automate response to avoid costly impact Over 5,000 businesses, governments, and healthcare organizations currently rely on Everbridge’s CEM Platform to assess threats, monitor the wellbeing of their workforces, rapidly communicate warnings, protect supply chains, and accelerate the analysis of their operational response. With its holistic approach to critical events, Everbridge will enhance Siemens’ capabilities to rapidly pinpoint threats and automate response to avoid costly impact- whether it’s the ongoing pandemic, cyberattacks, an IT outage, severe weather, workplace violence, or any number of critical events that impact life safety, business assets, supply chain or brand. AI and machine learning with Siemens alliance “With critical events such as COVID-19 on the rise, we are proud to form an alliance with such a forward-thinking global brand like Siemens,” said Javier Colado, Senior Vice President, International at Everbridge. “We are excited to work with Siemens to roll out CEM as part of our recent launch of the platform in Europe and to also collaborate in the areas of AI and machine learning to continue to advance our capabilities.” To date, the Everbridge platform has delivered over 600 million communications specific to coronavirus As the global provider in critical event management and public warning, Everbridge and its platform reach over 550 million people across the world while serving Fortune 500 companies as well as cities, states, and entire countries. “Given Siemens role as a technology provider, their alliance with Everbridge represents a significant milestone in the continued adoption of our CEM platform in the DACH region,” said Andreas Junck, GM of Everbridge DACH Region. Real-time risk intelligence based on 22,000 data sources In response to COVID-19, Everbridge quickly launched a coronavirus data feed which supplements its existing real-time risk intelligence based on 22,000 data sources across 175 countries. To date, the Everbridge platform has delivered over 600 million communications specific to coronavirus, and launched its COVID-19 Shield™ rapid deployment software templates to protect people and maintain operations amid the pandemic. More recently, Everbridge introduced its COVID-19 “Return to Work” and Contact Tracing solutions to help customers manage the process of bringing back their people to offices and other public places, while mitigating the threat of coronavirus. Everbridge recently launched its award-winning software platform in Europe, demonstrating the power and breadth of CEM during a virtual executive summit. The summit featured C-level speakers from Siemens, Accenture, Syniverse, Finastra and Control Risks.
The perimeter is the first line of defense against intruders who could put people or assets in danger. For many forward-looking businesses, the answer is to deploy thermal cameras, which offers a number of advanced benefits. In complex light environments, at night, or in severe weather conditions, many conventional ‘visible light’ cameras may not be able to recognize intruders and alert security teams. By contrast, thermal cameras can recognize tiny changes in temperature, allowing them to detect people or vehicles that cross perimeter boundaries even in extremely low-light or low-visibility conditions. Some thermal cameras incorporate deep learning algorithms to distinguish humans and vehicles from animals, falling leaves, and other moving objects that could otherwise trigger false alarms. This means that intrusion alarms are only triggered when a real perimeter threat is identified, which supports a faster response with far less time spent analyzing footage and investigating false alarms. Perimeter protection with minimal false alarms Another key benefit of thermal cameras is that they are effective at longer distances than many conventional ‘visible light’ cameras. This means that small and medium businesses can reduce equipment and installation costs for their perimeter-protection solutions, while also monitoring camera feeds with fewer team members. Hikvision offers a range of affordable thermal cameras that are ideally suited for perimeter protection in small and medium applications such as residential areas, office buildings, car parks, factories, stores, and even museums. With Hikvision’s thermal camera range, detection in real time of people or vehicles that breach perimeter defenses is made possible, even in low-light and poor-visibility conditions. As an added benefit, overlay of traditional video images on top of thermal camera images is possible, which ensures availability of evidence needed to support legal processes or insurance claims in the event of a perimeter breach. Hikvision thermal cameras for perimeter protection Hikvision’s range of thermal turret, bullet, and speed dome cameras are already being deployed in many perimeter protection solutions for housing developments, car parks, factories, stores, farms, and even museums. In one example of a successful project, a car brand is protecting one of its European dealerships 24 hours-a-day with Hikvision thermal cameras. In this case, the Hikvision camera alerts security teams if perimeter defenses are breached, enabling a real-time response to prevent the theft of vehicles or parts.
The COVID-19 pandemic is the defining global health crisis of our time. In order to be able to fight against it, mask detection and temperature measurement have become daily routines for everyone. In this situation, Merit LILIN, with over 40 years of experience in IP video manufacturers of IP cameras, recording devices, and software, have created a cost-effective COVID-19 solution to ensure end-user health and safety. Temperature measurement Many solutions should provide temperature information, with alert settings that trigger alarms when temperatures are high. The main component of LILIN Temperature Measuring Camera is a dual-lens camera with two sensors, one a visible image lens and the other a thermal array sensor. This design not only provides temperature information and color image information but also high-temperature alert settings when the temperature exceeds. Mask detection With COVID-19 rules and regulations now incorporating person protection equipment such as masks, many solutions are now geared towards mask detection. LILIN has its own mask detection AI, which can be run on an i3 CPU-supported PC. Using the LILIN AI system and Aida NAV server, the system can recognize if the person is wearing a mask or not. If the system identifies a user that is not wearing a mask, an alert goes out with an image of the person. It allows the application to run automatically and enforces the wearing of masks in many situations. A notification is sent to an administrator when an image of a person is captured. Social distancing measures In addition to temperature measurement and mask detection becoming daily epidemic prevention matters, maintaining social distance is extremely significant as well. Through the LILIN Aida detection system, people can calculate the social density and use it with alarm notifications, if an area exceeds the density threshold. Moreover, the LILIN COVID-19 solution has a wide range of applications in different sectors, including schools, public transportation systems, offices, retail and more. By doing so, extensive safety measures can combat COVID-19, providing the public with intelligent epidemic prevention solutions, through innovative AI detection systems.
The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organizations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organizations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organization show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimizes risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organizations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimize wait times. Customize the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organizations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organizations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organizations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organizations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organizations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.
Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimized systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimize their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimize further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimized for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove compartment despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle.Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment Rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, September 23-27. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions On Gun Visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organizations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organizations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX Education Program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organization around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
Schools and heritage sites present their own unique difficulties for security and access control. But what about a school that is also a heritage site of exceptional value? This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum which requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School leaders also required little disturbance of everyday school learning. Wireless access control was the obvious answer. Wireless access control devices The school chose SMARTair Wireless Online management for their new keyless access system SMARTair wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts), are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. Issue access credentials “The main benefit is the ease of real-time key management - from any place and at any time - via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff, because no unauthorized people can enter the school.” SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. Installation and integration The system was installed without a hitch and also without any disruption to classes" “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. Education management software SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
Auto Trader is an FTSE100 technology company and is an agile, fast-paced business, and so needs to have a robust risk management framework which gives the ability to manage risks on a real-time basis. It had an existing risk and compliance management framework; however, this relied on multiple spreadsheets, and so action tracking and reporting were a manual and lengthy process. They were looking for a solution that could bring together multiple risk registers, give them the ability to assign actions to risk owners for them to maintain and provide real-time reporting and dashboards at different levels of detail. Auto Trader wanted a solution that out of the box met most of their requirements, but also needed a flexible solution and so recognized the need for professional services to configure to meet specific requirements. Gartner’s Magic Quadrants They saw that SureCloud’s solutions could allow them to aggregate risks across different business functions, to track actions and to report on a real-time basis. The fact that SureCloud also has a vast portfolio of GRC solutions that may be useful to Auto Trader in the future as they expand their GRC journey attracted them to Platform, as the business could grow into the solution over time. Auto Trader needed a solution that was easy and intuitive to operate, to ensure users will feel confident in how to navigate the software and therefore gain quick value. They also wanted users to be able to "dip in and out" of the Platform quickly. After reviewing several solutions, many on Gartner’s Magic Quadrants like SureCloud. Auto Trader found that other vendors lacked the flexibility that SureCloud offered. Manage complex risks We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions" Claire Baty, Governance, Risk and Compliance Director at Auto Trader, commented: “We were looking for a solution that would be simple to use, yet provide the ability to manage complex risks, while complementing our agile ways of working." "We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions, as it gave us the ability to design our own user journeys and reporting tools, and the modular approach that means we can continue to enhance our framework over time. We are looking forward to working with SureCloud on this important project.” Digital automotive marketplace Nick Rafferty, COO at SureCloud commented: “We are thrilled to be working with Auto Trader, the UK and Ireland's largest digital automotive marketplace. Not only to help them meet their Risk and Compliance needs but also to be chosen due to our level of agility in our Platform. I look forward to seeing the relationship grow as our technology flexes to their way of working while automating and streamlining their programs." "SureCloud is proud to be helping another market-leader ditch spreadsheets for good.”
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that 32-41 West Street, a retail headquarters building in Reading, United Kingdom, has upgraded the building’s entrance with an energy-saving revolving door and an array of optical turnstiles for increased lobby security. Nestled in Reading, Berkshire, in the United Kingdom, 32-41 West Street serves as a home to 580+ employees working in over 130,000 sq. ft. of office space. In 2018, Morey Smith Architects were hired to redesign the headquarters building, including an office expansion, as well as a new café and staff gym. Revolving door solution The building entry and atrium were to also undergo an upgrade, with architects designing with aesthetics and high-quality functionality in mind. First, the entrance to the building was outfitted with a unique revolving door solution. Architects combined features of two revolving door models to create the ultimate entrance Architects combined features of two revolving door models to create the ultimate entrance. They mixed the all-glass look of the Crystal TQ with the minimal metal framing of the TQA to create an automatic entrance that would add to the prestige of the building while also saving on energy and creating a comfortable environment inside. The revolving door was also connected to the building’s access control system so that it could be locked afterhours and still allow access to employees with an authorized credential. Tall glass barriers For security into the atrium, architects didn’t want to impose on the open, airy feeling of the building’s large atrium. As a result, Morey Smith installed an array of Speedlane Swing optical turnstiles with tall glass barriers to deter and detect tailgating into the office space. The turnstiles were placed near a reception desk so that staff are able to respond to alarms, as well as grant access to authorized visitors through the use of a BoonTouch remote control panel. James Cox, Area Sales Manager for Boon Edam UK mentions, “Boon Edam optical turnstiles are always a popular choice for corporate offices, not only for security reasons but because they’re aesthetically nice to look at which is ideal for an open environment building.”
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualized in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customizable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
A very high-risk site belonging to a large and well-known cash handling business was located in a busy commercial complex. The company had identified a security weak-spot in its facility - namely the roof and the skylights within the roof. They had considered using active infrared beams, but these had been discounted because they could not cover the entire roof space. CCTV with video analytics was also considered, but similarly discounted since it is easily affected by varying light and shadow conditions, and its reliability could not therefore be depended upon. REDSCAN unit can protect a flat roof The solution was to install REDSCAN to cover the whole surface of the roof and skylights, integrating the detection units with the existing alarm system so that any potential intrusion is alerted. The detection area of the REDSCAN was easy to set up to the exact shape and size of the roof; a single REDSCAN unit can protect a flat roof. The sensitivity of the target object size and speed can be adjusted to dramatically reduce the possibility of false alarms from birds or fog. The weak spot identified by the customer is now secure, giving peace of mind to the end user. False alarms are at an absolute minimum due to the laser technology and the ability to set the detection area.
ExcelRedstone is implementing an ambitious integration project, using Maxxess eFusion technology, at the first high-rise residential and hospitality development in the City of London for many years. Currently under construction, the £300m 43-story One Bishopsgate Plaza development will see security and building management technology operating seamlessly together in a setting that includes both new-build and listed conservation area structures. As well as having 160 new private apartments, when completed the development will include a 237-bed five star Pan Pacific Hotel, a public plaza and a Pacific Ballroom, promoted as the Square Mile’s first dedicated banqueting venue. ExcelRedstone selected eFusion for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. Umbrella management system “The customer wanted a seamless, single interface that allows front of house guest services to be linked to back of house functions and give the highest operator efficiency and enhanced customer experience,” says Matt Salter, Director, ExcelRedstone. eFusion provides an umbrella management system for an expanding choice of preferred technologies With its modular, building block approach, eFusion provides an umbrella management system for an expanding choice of preferred technologies for commercial, hospitality and mixed-use settings, including guest check-in, reservation & visitor management, access control, surveillance, and building systems. In use, eFusion drives efficiency and eliminates gaps in security by removing the need for operators to continually switch between systems. Video management system Two of the most important technologies being integrated by eFusion at One Bishopsgate Plaza are the full-featured, Oracle Hospitality Opera property management & guest service system, and a 266 door ASSA ABLOY wireless electronic locking solution. ExcelRedstone is also using eFusion to integrate Zenitel IP intercoms, a KONE elevator system, and the building management (BMS) system using the BACnet protocol, which will enable estate managers to optimize energy efficiency based on usage and occupancy. The eFusion integration also allows a more flexible approach with the surveillance system - for example, making it easy to use a choice of Axis cameras, with specialist mounts, in the listed conservation areas of the site, integrating them with over 350 Mobotix fixed lens and panoramic cameras through the highly-secure Wavestore video management system (VMS). Networking and AV systems ExcelRedstone is also responsible for networking and AV systems at the development The surveillance and other security systems will be monitored live from two separate control rooms, one for the hotel and one for the wider estate. As well as integrating these and fitting out the control rooms, ExcelRedstone is also responsible for networking and AV systems at the development. “Our engineers are pre-staging the entire system off-site,” explains Salter. “This is allowing us to test everything in advance and to reduce packaging waste and environmental impact on site. It also lets us work more efficiently, in step with the ongoing construction schedule, floor by floor.” Providing secure solutions One Bishopsgate is the latest of a growing number of mixed-use developments - including hotels, retail, office and residential complexes - to use eFusion to streamline security, safety and facilities management. “We are seeing a growing trend towards automation and centralized management, and the solutions being deployed at these locations are increasingly sophisticated – but that doesn’t mean they have to be complex,” says Lee Copland, Managing Director EMEA, Maxxess. “Quite the opposite in fact. By keeping things simple and integrating off-the-shelf with the widest choice of technologies, Maxxess is providing secure solutions that are easier to install and to use than traditional alternatives.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?