Auth0, the modern identity platform solutions provider, has announced the Auth0 identity operating system (identity OS), a cloud-native and adaptable platform for development teams. Auth0 identity OS Built with extensible building blocks, the Auth0 identity OS enables organizations to manage the complexities of modern identity management, while also prioritizing the security, privacy and convenience of their end users. Striking the perfect balance among these priorities requires identity to i...
Allied Universal, a security and facility services company, is seeking to hire more than 35,000 security professionals, administrative and managerial staff to fill positions over the next two months. Recently, Allied Universal joined forces with London-based security provider G4S and is now the 3rd largest employer in North America. The company’s goal is to seek security professionals to support its local operations in communities across the nation. Allied Universal is offering hiring bon...
Aqua Security, the pure-play cloud native security solutions company, has published new research from Team Nautilus revealing that a significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services. According to the new findings from Aqua Security’s ‘2021 Cloud Security Report: Cloud Configuration Risks Exposed’, these misconfigurations, for example leaving bucket or blog storage open, can open companies up to crit...
The Connectivity Standards Alliance (CSA), formerly known as the Zigbee Alliance, an organization of hundreds of companies creating, maintaining, and delivering open, global standards for the Internet of Things (IoT), announces Matter – the interoperable, secure connectivity standard for the future of the smart home. The proliferation of connected objects continues to change the way one lives, works and plays. From homes to offices, factories to hospitals, connected objects enable one to...
Gunnebo Entrance Control announced the launch of EntraLinq, a new software as a service (SaaS) application providing remote monitoring and control of office building accesses. The app, which connects to Gunnebo speed gates, delivers both intuitive yet in-depth visibility of building access processes and performance, serving as an easy at hand decision-making support tool for managing people flow, maintenance and security as efficiently as possible. EntraLinq uses the intelligence and connectivi...
Williams Racing is pleased to welcome Vuzion, a UK-based cloud distributor, as the Acronis #CyberFit Delivery Partner, in line with the Cyber Protection Partnership between Williams and Acronis that was renewed earlier this year. Since Williams and Acronis first partnered at the start of the 2018 Formula One season, Acronis has helped the team manage growing volumes of data without compromising the security and flexibility mandated by the sport. AI-enhanced solution Williams has benefited fro...
LenelS2 introduced its indoor location subscription-based service for businesses and other organizations using LenelS2’s BlueDiamond™ cellphone app version 2.1.8 for smartphones. Touchless solutions This new premium cellphone app service complements LenelS2’s touchless access solutions by providing users with: the ability to quickly pull up a map to determine the current location within a building, search for points of interest, use turn-by-turn directions for efficient navigation and unlock doors directly from a building map. The service is an advanced solution in Carrier’s Healthy Buildings Program. LenelS2, an advanced security systems, and services company is a part of Carrier Global Corporation, the global provider of healthy, safe, and sustainable building, and cold chain solutions. Efficient building navigation “Our new BlueDiamond Indoor Location service raises the bar for mobile credential app capabilities. BlueDiamond mobile credential holders can confidently find their way within buildings, enabling easier, more efficient building navigation,” said Ernie Chan, General Manager, BlueDiamond and Value-Added Services, LenelS2. “This new capability expands the ways credentialed users experience touchless access control, including unlocking doors in their path.” Unlock with voice commands For customers utilizing the LenelS2™ OnGuard® or NetBox™ access control security systems, the Indoor Location service provides app users with convenient facility-wide navigation. From corporate campuses to entertainment venues, hospitals, convention centers, and more, users can quickly get directions by pulling up a map from their smartphone to show their current location and search for points of interest such as meeting rooms, exits, and more. Users can also unlock doors using voice commands for an enhanced touchless access experience In combination with BlueDiamond readers, users can also unlock doors using voice commands or other app features for an enhanced touchless access experience. Compatible with various technologies The Indoor Location service is hardware-agnostic, allowing it to work with various technologies including Wi-Fi, Bluetooth Low Energy, and virtual beacons. Organizations can digitize facility maps and define dynamic points of interest. The beacons deployed throughout the facility enable the app to triangulate the smartphone’s location for display on the map. The Indoor Location service joins the recently announced Contact Notification service as part of BlueDiamond mobile app version 2.1.8 that also includes a variety of non-subscription-based updates to improve the access control and user experience.
A new Code Handle digital PIN lock can be fitted to a standard interior door in less than half a minute. In this short space of time, security for private offices, stock rooms, staff toilets, equipment stores, consulting rooms, home offices, boardrooms and more can get a major security upgrade, with no wires, no keys and no need to run an access control system. Code Handle Code Handle is a locking handle with a built-in digital PIN keypad. It adds keyless electronic security to almost any interior door. The battery-powered handle is designed for fast, easy installation by almost anyone, with no expertise required. But exactly how fast? ASSA ABLOY Opening Solutions launched a competition to find out. Locksmiths, security installers and access experts were invited to enter their installation videos using the hashtag - #ReadySetCode. The winning entry, Jiri Van Hoyweghen from Belgium, completed a Code Handle installation, from start to finish, in just 26 seconds. Easy installation and keyless door security upgrade Installing a new Code Handle is easy, with no wires, no specialist tools, and no drilling Installing a new Code Handle is easy, with no wires, no specialist tools, and no drilling. Two screws attach a Code Handle to almost any interior door, up to 80mm thick. A Code Handle can secure any interior door facing a heavily trafficked space — subtly and with zero hassle. Slim and attractive, it’s brushed steel and chrome exterior looks like any stylish handle. Enhanced door security Keyless entry via up to 9 different user PINs (4 to 6 digits) secures doors, without creating unnecessary key-handling workload. “The main advantage for us is that users can go to the office with no keys, as it provides enough security for our needs,” said Augusta29’s Chief Executive Officer (CEO), Miguel Ángel Villota Mocho. Barcelona’s Augusta 29 locks their flexible office rentals and meeting rooms with 40 Code Handle devices. Auto-locking feature Users enter a PIN code on the handle’s keypad and the door to their rented workspace unlocks. Code Handle’s optional auto-locking feature further enhances office safety. When the door closes, Code Handle locks it automatically. Code Handle also blocks automatically when an intruder enters the wrong PIN code 5 times. It offers a major door security upgrade — in exchange for 26 seconds’ work, or just a little more.
Actuate, the globally renowned provider of automation and intelligence software for smart security camera systems, has announced that it has closed its Series A financing of US$ 8 million to expand the capabilities of its computer vision technology and build on the company’s growing portfolio of customers. The funding round was led by Tribeca Venture Partners and joined by Scribble Ventures, OCA Ventures, and Context Ventures, with additional support from existing investors, including Bling Capital, Upside Partnership, and Tensility Venture Partners. Critical layer of intelligence About 90% of organizations have security cameras, yet many cameras are unmonitored and most data goes unused, which can endanger lives and lead to significant economic losses. Actuate is adding a critical layer of automation and intelligence to support data-driven security decisions and enhanced vigilance. The company’s AI-powered computer vision software turns any security camera into an intruder- and threat-detecting smart camera that dramatically reduces the time it takes for security teams and law enforcement to respond to issues. AI-powered computer vision technology The Actuate solution integrates with any existing security camera without additional hardware The Actuate solution integrates with any existing security camera without additional hardware, providing organizations with safer, cost-efficient and end-to-end security automation. The software identifies safety and security threats in real time, reducing false positives by as much as 99%. When threats are detected, alerts are issued automatically, in order to help security teams respond quickly to gun presence, intruders, social distancing violations, loitering, and other security events. Security management solutions Actuate’s analytics are trusted by hundreds of customers nationwide and deployed at over 1,000 sites, including schools, offices, military facilities, construction sites, affordable housing, high-end residential buildings and industrial facilities. “We unfortunately live in a world where active shooter events and public safety threats continue to make headlines year after year, pointing to the critical need for faster, more accurate, and privacy-conscious security management solutions,” said Sonny Tai, the Chief Executive Officer (CEO) of Actuate. End-to-end security automation Sonny Tai adds, “Actuate empowers security staff at the places we live, work, shop, and depend on with end-to-end security automation, helping them to do their jobs better and improve safety outcomes. As we culminate a year of exponential growth, this support from our investors will be instrumental in driving the adoption of our security management platform and growing the range and accuracy of our privacy-conscious AI.” In leveraging the new funding to expand its solution’s capabilities, Actuate is enhancing its behavior detection technology, which allows the software to detect adverse events or accidents, such as slip-and-fall incidents, and is also further developing its all-in-one security management platform. Real-time video analytics and automation With its unique AI software, Actuate is bringing physical security into the age of automation" “With its unique AI software, Actuate is bringing physical security into the age of automation,” said Brian Hirsch, Managing Partner of Tribeca Venture Partners, adding “Actuate’s end-to-end platform, powered by unique IP, solves a myriad of security and building management challenges, across organizations through real-time, video-based analytics and automation.” “With professionals and students returning to offices and schools, we see a huge opportunity for Actuate’s solution to help manage social distancing concerns, while cost-effectively protecting against security and safety events that can not only hurt the bottom line, but also puts lives at risk. We’re proud to support the company in its mission to ensure a safer, more peaceful future for all.” Security monitoring service “We started deploying Actuate’s AI models this year and the difference in both accuracy and technical support has been palpable, so seeing Actuate’s venture funding success comes as no surprise,” said Blake Ballard, Director of Operations for Louisiana-based security company, Global Monitoring Solutions. Blake Ballard adds, “Security teams rely on technology and tools that work proactively to ensure safety at all times. Utilizing Actuate’s exceptional platform and top-notch team has enabled us to provide a much more reliable security monitoring service to our customers, making them the only solution we’d work with.”
SKIDATA, the globally renowned company in parking access and revenue management, has announced a new technology integration partnership with Openpath, an international company in touchless and modern access control, and workplace safety automation. SKIDATA – Openpath partnership Through this partnership, Openpath’s ground-breaking touchless and mobile access control technology will be integrated into SKIDATA’s parking access and revenue control equipment, in order to permit drivers to enter and exit SKIDATA-equipped parking facilities, using their Openpath credentials. “We are excited to be partnering with Openpath,” said Darrell Smithson, President for North America region at SKIDATA, adding “SKIDATA already makes the world’s most reliable and user-friendly parking equipment. The addition of Openpath’s technology will improve the customer experience by providing seamless entry into parking facilities.” Touchless and mobile access control This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure" “SKIDATA has always led the way when it comes to introducing new technological capabilities to the parking industry,” continued Darrell Smithson, adding “This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure.” The addition of Openpath’s technology, which provides touchless and mobile access via Bluetooth, Wi-Fi, and LTE technologies, to SKIDATA equipment, will permit drivers to access SKIDATA-equipped parking facilities with their smartphones and other personal devices, as well as via license plate recognition (LPR), allowing drivers to enter and exit parking garages quickly and conveniently, without having to stop and swipe a card, or reach out of their vehicle to validate parking access. Mobile access for parking facilities When drivers approach the parking facility, they can gain access via the SKIDATA app on their personal devices. Bluetooth, Wi-Fi, and LTE connectivity access are most useful for managing permit parking and the technology is perfect for parking owners and organizations, which offer permit parking, including residential facilities, office complexes, universities, hospitals, airports, special events parking, and stand-alone parking garages. James Segil, President and Co-Founder of Openpath, “With this integration, we are excited to further demonstrate how Openpath’s seamless user experience extends beyond just the four walls of a building. Providing safety and simplicity for users throughout their day; from the moment their vehicle enters the parking garage, to the doors, elevators, and turnstiles they use in repetition. End-to-end security solution James Segil adds, “Openpath’s technology enables a completely touchless experience for tenants and guests, and eliminates the need for users to juggle multiple apps or credentials to get where they are going. Our mission is always to deliver end-to-end security, while reducing friction and this integration is another great example of that.”
Sepura launches SmartChat, a secure operational messaging solution that joins smartphone, tablet, and office-based staff with field officers equipped with TETRA terminals. SmartChat enables mission critical messages to be shared between users on a secure TETRA platform, enabling all members of the operational team to be kept informed and aware of developing intelligence. Crucially, SmartChat enables TETRA radio users to see and share text and image-based communications. It can be extended to multiple web browsers and smart devices with either iOS or Android-based operating systems, meaning data is shared across an entire operational team, not just those with a particular device. Supporting voice communications Using chat-based messaging to support voice communications means it is easier to share complex or hard to remember information such as an address or a specific location, a car registration, or a maintenance part. Messages are stored on the device and available for reference when required. Similarly, images can be shared and used for reference during operations; for instance, the image of a missing person sent to rescue teams; an image of a burst water pipe sent to maintenance teams, or an image of a missing part sent to the purchasing team to allow a repair to be completed. By using the secure TETRA network, SmartChat ensures crucial information is received by users even when the broadband coverage is poor – this is frequently the case in large buildings, underground locations, or remote spots. Unique applications environment This means additional resources can quickly be added to an operational team User groups can be quickly expanded to include any connected device with the SmartChat application downloaded. This means additional resources can quickly be added to an operational team, with a history of conversation to bring them up to speed. This feature supports operational teams such as maintenance teams in utilities or oil and gas plants when officers are added to an operation, or for regular operations ahead of a shift change. The application is the latest in Sepura’s portfolio of applications available via AppSPACE, a unique applications environment available on Sepura’s SC Series mobile and hand portable radios. Mission critical users Jon Cossins, Product Manager at Sepura said: “SmartChat was designed to improve overall situational awareness for mission critical users. For these users, their next action is often dependent on the information they have to hand. By sharing data as widely as possible, in a simple user interface, the application seamlessly joins smartphone, control room and TETRA radio users. This improves operational efficiency and supports staff safety.” Peter Hudson, Chief Technology Officer at Sepura added: “We are seeing an increase in the number of smartphone users in the commercial and mission critical environment, but these users are unable to share information with front line users of TETRA radios. This is as relevant in critical national infrastructure such as transport and utilities as it is in public safety. SmartChat is a powerful solution to support these organizations; using the benefits of a secure TETRA platform and ensuring that voice channels are kept free for emergency communications.”
FireEye, Inc., the intelligence-led security company, has announced the expansion of its Mandiant Advantage SaaS platform, now equipped with a powerful, multi-vendor XDR capability and also introduced its newest module – Mandiant Automated Defense. Mandiant Automated Defense Mandiant Automated Defense is the latest module available in the Mandiant Advantage platform, joining the Mandiant Threat Intelligence and Mandiant Security Validation modules. Organizations struggle to consistently, quickly, and accurately assess and investigate the multitude of alerts received by their security operations centers (SOC) daily. In February 2021 alone, Mandiant Automated Defense reduced more than 52 billion customer alerts, down to less than 700 prioritized investigations. Intelligent SaaS interface Mandiant Automated Defense increases its ability to scale its unique expertise and intelligence as software Formerly Respond Software’s virtual analyst product, Mandiant Automated Defense dramatically increases Mandiant's ability to scale its unique expertise and intelligence as software, delivered through an easy-to-deploy SaaS interface. “Skill shortages, an overwhelming number of alerts, and even misconfigured tools all contribute to the challenges faced by the modern SOC,” said Christopher (Chris) Key, Executive Vice President of Products, Mandiant Solutions, adding “Our customers have been asking us for technology that embeds Mandiant expertise and intelligence into their environments at scale – Mandiant Automated Defense is another of our products that does just that.” Enhanced cyber security Mandiant Automated Defense addresses the people, process, and technology challenges faced by cyber security defenders in the SOC. Automated Defense allows security analysts to triage alerts from the security stack at machine speed, scale, and consistency using data science and machine learning. This automated triage process is designed to enable security personnel to prioritize and focus on the most relevant threats, reducing time wasted on false positives. Intelligence-driven approach to security operations “Enterprises are truly changing the way they manage security operations,” said Jon Oltsik, Senior Principal Analyst and Fellow, Enterprise Strategy Group, adding “Through Respond Software, Mandiant has added an innovator in security operations that can help enable security teams better serve customers, increase productivity, and achieve better cyber security business outcomes. Mandiant Automated Defense can help customers truly work without boundaries – outside of their current tools and processes.” Mandiant Advantage is an intelligence-driven approach to security operations. Without a significant increase in human expertise, it is impossible for organizations to win the global war on cybercrime. Accessible and automated security solutions Mandiant Advantage productizes attacker expertise and threat intelligence capabilities into accessible, automated solutions that instantly provide the scale and capability that security teams so desperately need. Supporting more than 60 security technologies, cloud platforms and network management tools, the Mandiant Advantage SaaS platform works with best-of-breed, multi-vendor controls to deliver state-of-the-art XDR capabilities. The Mandiant Advantage platform now includes three modules: Mandiant Threat Intelligence Mandiant Security Validation (formerly Verodin) Mandiant Automated Defense (formerly Respond Software)
The global pandemic has triggered considerable innovation and change in the video surveillance sector. Last year, organizations around the globe embraced video surveillance technologies to manage social distancing, monitor occupancy levels in internal and external settings, and enhance their return-to-work processes. Forced to reimagine nearly every facet of their operations for a new post-COVID reality, companies were quick to seize on the possibilities offered by today’s next-generation video surveillance systems. Whether that was utilizing motion sensing technologies to automatically close doors or switch on lighting in near-deserted office facilities. Or checking if people were wearing masks and adhering to distancing rules. Or keeping a watchful eye on streets and public spaces during mandated curfew hours. Beyond surveillance and monitoring use cases, organizations also took advantage of a raft of new Artificial Intelligence (AI) applications to undertake a range of tasks. Everything from automating their building management and optimizing warehouse operations, to increasing manufacturing output and undertaking predictive maintenance. Behind the scenes, three key trends all contributed to the growing ubiquity of video surveillance observed in a variety of government, healthcare, corporate, retail, and industry settings. Video surveillance takes to the Cloud Last year the shift to digital working led organizations to rapidly embrace cloud-enabled services, including cloud-hosted Video Surveillance As A Service (VSaaS) solutions that provide tremendous economies of scale and flexibility. Alongside significant cost savings, these solutions make it easier for organizations to enhance their disaster recovery and manage their video surveillance estate in new and highly effective ways. Surveillance cameras with audio recording were used more than 200% by customers between 2016 and 2020 For example, in addition to enabling remote access and maintenance, today’s cloud-powered systems eliminate any need to invest in local storage technologies that all too often fail to keep pace with an organization’s growing data storage requirements. Indeed, data from our worldwide customer base survey reveals how in 2020 an impressive 63% of organizations had abandoned using any on-premises storage option and were instead only storing all their video surveillance recordings and data in the Cloud. A deeper review of the global stats shows that the average cloud recording retention period for this stored data was 28.2 days, with organizations in Asia topping the global average at 38 days – 33% higher than was observed in any other region. Improvements in bandwidth and scalability engendered by the Cloud have also helped boost the growing utilization of audio recordings in addition to visual image capture. Indeed, our research found the number of surveillance cameras with an audio recording facility used by customers jumped more than 200% between 2016 and 2020. Making sense of Big Data The enhanced ease of connectivity and scalable bandwidth made possible by the Cloud is stimulating more companies to connect a lot more video surveillance cameras to their networks. The top motivation for doing so is to generate live metrics and data that can be utilized to deliver enhanced business insights and operational intelligence. In recent years, a rich choice of video analytics solutions have been developed for a variety of industry verticals. The range of functionalities on offer is impressive and covers a variety of applications. Everything from making it easy to classify and track objects and behavior patterns in real-time, to undertaking anomaly detection, or generating predictions based on past and present events/activities. Data collected via today’s cloud connected cameras can now also be used to feed deep learning training and AI analytics, utilizing the unparalleled virtualized processing capacity of the Cloud to convert Big Data into usable information quickly. By integrating this information with data from other enterprise data capture systems, organizations are now able to gain a 360-degree view of their operations – in almost real-time. IT is now in the driving seat No longer the sole preserve of on-site security staff, the wider application and business use of video surveillance means that IT is increasingly taking the lead role where the management and control of these systems are concerned. IT is asked to integrate video surveillance into key enterprise platforms to generate the data that business leaders need Aside from the fact that IT has a vested interest in addressing the cybersecurity implications that come with attaching a growing range of IoT devices to the enterprise network, they’re also increasingly being asked to integrate video surveillance into key enterprise platforms to generate the data that business leaders need. As organizations expand their integration of video with other business applications, such as point of sale, access control, process control, and manufacturing systems, this trend is only set to accelerate. Looking to the future Right now, the video surveillance industry is at a key tipping point, as video systems become increasingly strategic for enabling the enterprise to boost productivity, stay compliant, and fulfill its obligations to protect employees and customers. As the technology’s contribution to enhanced data-driven decision-making and problem solving continues to increase, expect the adoption of IP connected video cameras to burgeon as organizations look to capture more data from their day-to-day business operations.
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offices and other workspaces will be tasked with supporting a hybrid work solution, as well as increasing hygiene measures. Video intercom solution This is where an IP video intercom solution can assist. Below are four ways they can help usher in a smarter, safer work environment: Video intercoms assist in creating a more hygienic work environment - The outbreak of COVID-19 has raised awareness of germs and just how easily a virus can be transmitted by face-to-face contact. Germ barriers are popping up in many aspects of our daily lives, where we were not likely to see them before Unfortunately, the door is also the easiest of these germ barriers to breach As such, we’re becoming accustomed to seeing plexiglass barriers at restaurants, grocery stores, and even coffee shops. However, many don’t realize that one of the best germ barriers is a simple door. Unfortunately, the door is also the easiest of these germ barriers to breach. All it takes is a knock or a doorbell ring to make us open our germ barrier and be face-to-face with whomever is on the other side. Increasing hygiene safety A simple step to increase hygiene safety and visitor security in commercial buildings and workspaces is an IP video intercom. Installing a video intercom will allow staff to see and speak with visitors without breaching that all-important germ barrier. A video intercom system provides a first line of defense, enabling the user to visually confirm the identity of the person on the other side of the door first before granting access. It can also be used to make sure proper procedures are being followed before a person is allowed to enter, such as using hand sanitizer, wearing a mask, and following social distancing guidelines. Basic security needs A major topic of conversation the past year has been how to manage occupancy in all facilities Video intercoms for occupancy management and basic security - A major topic of conversation the past year has been how to manage occupancy in all facilities—ranging from grocery stores and retail shops to restaurants and commercial buildings. Workspaces and offices are no exception. A video intercom provides a quick and convenient method of seeing who, or what, is on the unsecure side of the door before opening. For basic security needs, if a business has a door opening into an alley, a video intercom would be used to ensure no one is waiting outside to force their way in when the door is opened. Personal protection equipment Such solutions can also be used to ensure a person is carrying proper credentials, or wearing proper personal protection equipment (PPE), before entering a sensitive area. For example, if a lab has a room which can only be accessed by two persons at a time wearing specific protective gear, a video intercom could ensure each person is properly equipped, before allowing access that particular room. Additionally, for office or workspaces that have shared common areas, such as a cafeteria, gym or even conference rooms, managing access to these spaces will remain a priority, especially with post-pandemic restrictions in place. Video intercoms are a comprehensive safety and security tool for any workspace Deliveries of packages, work-related materials, or even food are common in any office or workspace. Video intercoms can assist in facilitating safe deliveries by visually and audibly confirming the identity of the individual. The visitor could be your next big client, your lunch delivery, a fellow employee with a faulty access card, or your mail. Video intercoms are a comprehensive safety and security tool for any workspace. Visitor management systems Video intercoms provide a cost-effective solution in small to mid-sized office facilities - One significant advantage of video intercom systems is the variety of applications available. Systems range from simple one-to-one video intercoms, to buzz-in systems, to full-fledged visitor management systems in mixed-use buildings. While they might lack the resources and manpower many enterprises have, small-to medium-sized offices can also take steps to ensure the safety of their staff and customers. Like any business, controlling who comes into the building is a primary way of maintaining safety. Video intercoms work in conjunction with access control systems to provide an identifying view of visitors or employees with lost or missing credentials. They allow staff to both see and hear those on the unsecured side of the door to determine intent before granting access. Most quality video intercoms will provide a clear enough image to allow an identification card to be read by holding it close to the lens, adding another opportunity to verify identity. Touchless intercom activation One major trend is the option of providing a touchless door activation Video intercoms provide a touchless option - Even prior to COVID-19, one major trend is the option of providing a touchless door activation or touchless intercom activation of a video intercom for those without proper credentials. Though touchless isn’t a new solution to the access control market, the pandemic introduced a renewed focus on these types of solutions to provide hygienic access to visitors. For offices and other workspaces looking to make investments into post-pandemic solutions to assist in reopening, touchless can support these efforts. When it comes to smart, secure workspaces, many people think instantly of cameras or monitors, access control, and alarm systems. Proper access credentials However, video intercoms are often the missing piece of a building’s security puzzle. A video intercom provides an identifying view that is not always available from a camera covering a large area. They allow those without proper access credentials a method of requesting entry, and just like cameras, they can be activated by alarms to allow staff to clearly see and communicate. If a workspace or office is important enough to be secure, it’s important enough to be sure of who is there before the door is opened. In 2021, it’s not enough to ensure the physical security of your staff and visitors, but also to ensure they are accessing a hygienic environment. Video intercoms provide that security and peace of mind.
While COVID-19 caused widespread disruption and many challenges for businesses, its sudden arrival prompted some very quick decision-making around how to maintain operations. For some businesses, cloud-based video conferencing solutions provided a welcome alternative to meeting face-to-face. A year on and it seems that this sudden and mass adoption of cloud has accelerated a digital transformation process in other departments. Physical security too is increasingly moving to the cloud in the form of hosted solutions, where Video Surveillance as-a-Service (VSaaS) is providing comprehensive protection across a range of industries and sectors. To better understand the impact of this migration to the cloud, hosted security provider Morphean commissioned a survey of 1000 senior decision-makers across the UK, Germany, and Sweden, working in HR, facilities management, IT, and security. As well as ascertaining purchasing intent around hosted security applications among a broad spectrum of buyers, the results would provide key indications around the abilities of cloud to benefit organizations in regard to both security and business operations. An increasing urgency around VSaaS and ACaaS adoption Low costs, flexible scalability, demand for real-time and remote access to security data are key to the adoption of hosted solutions Survey results revealed that 51% of senior decision-makers are currently using cloud-based video surveillance (VSaaS) and/or a door entry/access control system (ACaaS). This represents a 3% increase in comparison to responses from a 2019 survey (48%), and broadly reflects projected growth in the physical security market from USD $93.5b in 2020 to USD $120.3b by 2025 at a CAGR of 5.2%. Low costs, flexible scalability, and demand for real-time and remote access to security data are key to the accelerated adoption of hosted solutions in the current climate. A significant 70% of respondents agreed that the pandemic had actually increased the necessity/urgency for businesses to adopt VSaaS and ACaaS, with IT Services revealed as the sector with most respondents strongly or somewhat agreeing (82%), followed by Security (73%). Results highlight a hosted physical security market which is in a strong position for 2021. Physical security utilizing the cloud can unlock many security and business benefits for the modern organization as it faces many new challenges. Business optimization and operational insights The benefits of VSaaS and ACaaS prompted Morphean to examine what areas of the business were optimized, or in need of improvement. 43% of those surveyed stated that data/information security was the most optimized aspect of their company. The total number of respondents who indicated that physical security was already optimized had risen by 4% since our 2019 survey, to 27%. It was those working in IT who saw the greatest disparity in security-related optimization, with far fewer recognizing that physical security was optimized (28%) compared with data/IT security (55%). This may point to an opportunity to increase physical security optimization to be on par with data/IT security. 95% of those surveyed agreed that if an existing security system could deliver insights beyond security to assist decision making it would influence adoption. It is clear that the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. As an example, consider an office environment where access control and video data can be used to determine an employee’s movements in the event of a positive COVID-19 result and alert others who may have made physical contact with that individual. A future proof business model Decision-makers surveyed that use of cloud technologies to increase in the future as a result of COVID-19 78% of the 1000 senior decision-makers surveyed anticipate their organizations’ use of cloud technologies to increase in the future as a result of COVID-19. Rather than being tied to fixed IT infrastructure on-premises, businesses are able to customize and scale quickly to meet ongoing challenges without the need for large upfront capital investment. The convenience of as-a-service can be paid for out of operational expenditure as a monthly cost. This is the proven business model of the cloud. Yet the security industry has been slow to adopt it. One key challenge is the way in which the prevalent business models in the sector operate. Transitioning to sales cycles based on monthly licenses rather than up-front purchases won’t be easy, but the security channel must learn how if it is to remain competitive and drive new business opportunities. This recurring revenue model will be interesting for the physical security industry who will have witnessed uncertainty and, in some cases, a downturn in revenues as decisions around capital expenditure were put on hold during the crisis. Full support and extensive functionality From a customer perspective, 28% of respondents highlighted cost benefits as a key factor in the move towards VSaaS/ACaaS and 19% indicated that they would expect to see all-inclusive updates/upgrades and support. VSaaS and ACaaS are supported by the latest software updates and firmware upgrades, so are always up to date. Additionally, functionality such as remote management allows operations to be monitored offsite via mobile device. Access from any location (32%), remote maintenance (31%), and the ability to monitor empty sites (29%) were all identified as key benefits of introducing VSaaS and ACaaS, alongside better security (40%) and better functionality (33%). The revelation that such technology is employed by over half of organizations across a wide range of industries is a comforting validation of its benefits, and evidence that hosted physical security is in great demand. 30% of those surveyed indicated that they did not currently use such solutions, but were considering their implementation. Cloud’s resilience and ability to connect the world during the COVID-19 pandemic has clearly proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. VSaaS and ACaaS provide flexibility in a security and business solution that meets the demands of a rapidly evolving industry.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Boon Edam Inc., a front-runner in security entrances and architectural revolving doors, announced that the Arta’a Arts Center in Aalter, Belgium has installed a Crystal TQ revolving door, bringing the Arts Center into full compliance with European safety requirements. The all-glass door also enhances the environment by creating a comfortable entryway full of natural light. Constructed in 2020, the Arta’a Arts Center houses numerous facilities, including the Academy for Music, Literature and Dance; the Academy for Visual Arts; the municipal library; a documentation center; and the culture and tourism unit. In addition to these public areas, there are residential apartments above the Center that are also accessed by the building’s main entry. In coordination with Basil Architecture, Boon Edam took on the challenge of designing an entrance solution that would be safe and secure while also complimenting the building’s beautiful architecture. Designing a multi-use building The Arts Center building is six stories tall, with two of the stories located underground level. The residential apartments are located on stories 2-4, and the facilities that comprise the Arts Center are located on the first floor, and the two underground floors. The Basil Architecture team was challenged to incorporate natural light into the two underground floors while also buffering the sound of a full rehearsing orchestra in the evening for those living in the upstairs apartments. The addition of the Crystal TQ door at the entrance also lent a hand in flooding the building with natural light To address the lighting issue, the architects strategically placed large glass areas, or “light wells” in areas that would shine down onto the underground floors. They also incorporated a bright and unique yellow color into the Center to give the impression of more light in the building. The addition of the Crystal TQ all-glass revolving door at the entrance also lent a hand in flooding the building with natural light. The Crystal TQ revolving door is constructed from glass with only the most minimal stainless-steel frame and capping. Because the Crystal TQ is the most transparent revolving door available, it makes an excellent addition to any building facade. The door is available in 3- or 4-wing configurations and is easy for the general public to push through. Requirements for the building’s main entrance When considering the type of door to incorporate into the Arts Center entrance, architects had several requirements: The capability of handling the large flow of residents and visitors, especially during peak times Easy to use for young and old The ability to lock the door down after-hours, while still allowing entry to apartment residents An open, bright, and elegant design to match the building interior The Crystal TQ revolving door checked all these boxes and more.
Busy offices need convenient interior security for any private spaces. Not everyone should be reading the important memo on the CEO’s desk. But nobody wants to be left looking after the keys. At one co-working space in Barcelona, Code Handle® Door locks solve the problem. Augusta 29 supplies flexible office rentals to small companies and those without a permanent HQ, as well as services including mail handling, virtual assistants, and meeting room bookings. Part of their remit is to control access everywhere in a secure and efficient way, separating private from “public” areas around the workspace. Managers sought a keyless system; a secure, wire-free digital alternative to keys and access smartcards that would help them stand out in Spain’s booming co-working sector. Any solution for private offices and meeting rooms should enable them to achieve this as simply as possible without having to hand out and track many mechanical keys, as they had done in the past. No more lost keys Code Handle® Door locks enable Augusta 29 to offer their tenants simple, keyless locking. Clients gain convenient access to their rented offices via individual 4- to 6-digit PINs. With Code Handle’s optional auto-locking feature enabled, their offices are securely locked as soon as the door closes. There is no need for Augusta 29 staff— or anyone else— to manage physical keys, or for any wires or access control system. Administrators issue up to 9 different user PINs per lock, which they can cancel or change anytime. Keys are no longer lost or unreturned. Everything is digital. Easy to configure and program The main advantage for us is that users can go to the office with no keys, as it provides enough security" The project ran in two phases. After a successful 2015 installation of 13 Code Handle locks, managers rolled out a further 27 in 2020. Meeting rooms are fitted with Code Handle locks, making them more private. “The main advantage for us is that users can go to the office with no keys, as it provides enough security for our needs,” says Augusta 29’s CEO, Miguel Ángel Villota Mocho. Installation was straightforward. Retrofitting a Code Handle to almost any interior door requires two screws: the existing cylinder remains, with just a change of handle. “Code Handle locks are easy to configure and program,” he adds. Unlike push-button locks, Code Handle looks good, too: brushed steel and chrome styling offers a product design that “fits perfectly with the types of doors we have and the overall design of the business center,” says Villota Mocho. With Code Handle Door, Augusta 29 retains the premium feel to its office interior.
ATG Access has launched the next generation in bridge protection technology: the Bridge Deck Expansion Beam. The system was developed in response to a call to the industry by the Center for the Protection of National Infrastructure after it identified the need for a hostile vehicle mitigation solution that could span across large bridge expansion joints. The system was developed after the identification of unique characteristics encountered when trying to secure bridge infrastructure from a hostile vehicle mitigation attack. A tested solution was required that could span across large bridge expansion joints facilitating a continuous line of protection. Impact of the Bridge Deck Expansion Beam The Bridge Deck Expansion Beam has an unrivaled expansion capacity of more than 250mm, and can also be used within a street scene environment to span across other obstructions such as service chambers or manhole covers, to achieve a continuous line of security measures. The new system was impact tested at the MIRA testing facility fitted on two of ATG’s Populus Bridge Bollards with unconnected foundations with a span of over five meters, simulating a wide double bridge expansion joint. It achieved the IWA 14-1 standard, successfully arresting a 7,200kg vehicle traveling at 48 kph. Vehicle access This means that the product can generally be accommodated within existing road finishes The Populus Bollard system onto which the Expansion Beam is mounted sits in a 40 mm deep foundation. This means that the product can generally be accommodated within existing road finishes and doesn’t require a new or additional upstanding curb to accommodate the bollard structure. The beam can be removed to allow for occasional vehicle access. As an additional benefit, the Expansion Beam’s slim profile means that it can be clad to accommodate a wide range of aesthetic options, including bespoke heritage designs if desired. Double expansion bridge joints Robert Ball, engineering director at ATG Access, commented, “Following the tragic terror attacks on Westminster Bridge and London Bridge, the security industry has been working hard to develop new solutions to ensure pedestrians and cyclists are as safe as possible when using bridges.” “Our new Bridge Deck Expansion Beam has been shown to work very effectively in tandem with our existing Populus system. While this system was already capable of dealing with normal bridge expansion joints, this next stage of innovation will now enable it to cope with large or double expansion bridge joints.” “We are very pleased to have developed a solution that will further improve the level of safety and security the Populus provides, while also complementing the surrounding aesthetics thanks to the array of cladding options available.”
Aeroturn LLC, a globally renowned turnstile manufacturer that offers 100% Made in the USA turnstiles, has announced that it has been selected to deploy its turnstiles by one of the nation’s largest family housing finance leader. Contactless biometric technology Currently, the multiple building campus consists of five buildings and is in the middle of a major security upgrade that includes the latest contactless biometric technology. The finance lender was looking for a turnstile manufacturer who was up to the challenge of developing a customized solution that could integrate easily with brand new biometric facial recognition readers with high throughput capabilities. Aeroturn was the clear winner and joined forces with Siemens to ensure a successful deployment. Aeroturn also designed, fabricated, and delivered a single lane test rig prior to the project commencement to help with a seamless integration to the new biometric technology. Aeroturn X-wing turnstiles Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile" “We are thrilled to have been selected by this financial giant for this important upgrade as the best turnstile solution in the industry to meet their security needs,” states Michael Stoll, Vice President of Technical Sales & Marketing at Aeroturn. Michael adds, “Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile, which offers durability, reliability our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” Customized biometric reader interface The project currently consists of 15 lanes of Aeroturn X-wing turnstiles with a customized biometric reader interface being installed within a one-year timeframe. Additional HQ buildings are in the initial specifying stages. Aeroturn continues to raise the bar on quality turnstile solutions and help high-profile facilities in multiple vertical markets improve safety and security.
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
Physiognomists play a critical role in casinos. In fact, until a relatively short while ago, it only required three parties to legally open a casino in Spain: a dealer, a cashier, and a physiognomist. They are, among other tasks, responsible for monitoring all gaming that takes place in a casino. Operations involving games with real money follow specific procedures defined down to the minutest detail. Non-adherence to these protocols can result in significant losses for the establishment. For example, a simple error in a chip count or accepting a late bet that results in a winner can create a serious economic problem. The Problem According to the Casino Gaming Regulations, to gain entry to gaming parlors, one has to present identification such as a driver’s license or equivalent. A casino’s need for personal identification by physiognomists is essential. It is necessary to identify individuals not authorized for access, whether they have decided to put their name on the General Register of Gaming Access Bans or they were banned from gaming establishments under gaming regulations. There is also the need in this environment to identify the presence of VIP clients. Facial recognition technology has become a huge help with its ability to create multiple group lists. The Approach The system installed in Casino consists of three AXIS Cameras with capabilities specially designed for facial recognition Herta’s BioSurveillance video surveillance solution detects multiple faces in real-time enabling the management of subjects at any moment, and it also enables the facility to teach the system using direct video capture. The system installed in Casino Gran Madrid consists of three AXIS Cameras with capabilities specially designed for facial recognition, using wide dynamic range (WDR) technology that enables identification even under backlighting conditions or when bright light sources are in view. This server-based facial recognition system is fully integrated with the casino’s video surveillance setup. From the control center, it provides a direct facial view of the last individuals to have accessed the establishment, the ability to perform quick searches, etc. The Results In the event that the security controls require follow-up, reviews are conducted in accordance with internal protocols to ensure maximum transparency and security in all operations. Currently, the reliability rate of facial recognition systems based on video analysis is higher than 95%. As a result of the implementation of a system of this type, used to support the work of physiognomists, the amount of time it takes to identify someone in a casino has been reduced to less than half, even at short notice and on days of peak attendance.
Round table discussion
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
When the United Kingdom voted to leave the European Union, a world of uncertainty unfolded for those doing business in the UK and the EU. The referendum was passed in July 2016. Including subsequent delays, the separation was completed after four years in January 2020, with a transition period ending December 2020. Even with the deadlines past, there are still pockets of uncertainty stemming from the separation. We asked this week’s Expert Panel Roundtable: How has Brexit affected the security industry?
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
Office security: Manufacturers & Suppliers
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload