Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (F...
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can appl...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
March Networks, a global provider of advanced video surveillance and video-based business intelligence solutions, is pleased to announce its complete lineup for Global Security Exchange (GSX) 2018. Intelligent Video Solutions In addition to the company’s solutions for financial, retail and transportation organizations, March Networks will showcase its newly launched Software as a Service (SaaS) offering for quick service restaurant (QSR) and convenience store (c-store) franchisees, as we...
Openpath, a company on a mission to bring frictionless access and better security to our workplaces, reveals that 94% of its users now use their smartphone over a keycard to enter the office, an enviable accomplishment in an industry with shockingly low mobile adoption rates. Recognising a general lack of mobile adoption in the access control industry, Openpath launches the Mullion Smart Reader to fill out its portfolio of access control readers. The sleek, versatile and compact design of the M...
Pivot3, the pioneer in hyperconverged infrastructure (HCI) performance and technology, announced that it has certified its infrastructure solutions for mission-critical IoT, safe cities and smart building environments operating with Milestone Systems video management software (VMS). This certification confirms that organizations can gain access to infrastructure that is proven to deliver the performance, resilience and scalability required in mission-critical environments. Enterprises rely on i...
Matrix has been a consistent participant of the HITEC expos and will be participating at the Houston event this year as well. They will be unveiling our new Extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like Cascading (up to 20 NVRs), Camera-wise Recording Retention and Database Level Integration. It also has plenty of other distinct features like High Resolution Recording, Playback, and Simultaneous Local and Remote Monitoring along with Storage Retention for Higher Number of Days. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for Real-time Security. All in all, these comprehensive, flexible, reliable, integrated NVRX provide a proficient, persistent and preventive security solution, suitable for enterprises and multi-location offices. Based on organization requirement, Matrix provides optimized shift planning, which enables admin schedule shifts to either an individual or a group of employees Tracking And Managing Shifts Of Employees Apart from this, Matrix will also be exhibiting their People Mobility Management solution for the hospitality segment. The solution can help manage multiple branches from a single location, track and manage multiple shifts of employees and manage access within premises. Based on organization requirement, Matrix provides optimized shift planning, which enables admin schedule shifts to either an individual or a group of employees. Mobile being the next generation technology in terms of security, Matrix will display its ‘Your Mobile is Your Identity’ solution. In Mobile based Access Control, user either scans the QR code through his/her mobile or just twists the mobile to get access using Bluetooth. A user can automatically mark attendance using GPS or Wi-Fi through mobile application. Enhancing Security With Biometric Solutions Additionally, to enhance the security, Matrix biometric solutions can be seamlessly integrated with any third party hardware such as Video Surveillance Solution, Magnetic Door Lock, Electronic Door Lock, Turnstile, etc. Witness cutting-edge Matrix biometric solutions at HITEC Houston. In the Telecom domain, they will be exhibiting ETERNITY NX and their Hospitality solution at the event. The Hospitality solution helps enhance guest experience and services, make staff more productive and streamline back office or administrative processes.
To provide a practical solution to the monitoring of transportation infrastructure, where maximum situational awareness is paramount, Bosch Building Technologies have combined the innovation behind their video security cameras with the video management expertise of Intelligent Security Systems (ISS). ISS is a developer of video management and video intelligence solutions. Their video management platform, SecurOS, focuses on securing large mission-critical applications such as industrial and manufacturing sites, transportation systems, banks, sports arenas, retail locations, and campuses & office complexes. Transportation security provides surveillance challenges in varying degrees of situation and scale, so effective license plate recognition is crucial SecurOS AUTO License Plate Recognition ISS differentiating video intelligence and image analytics solutions, whether it is Face Capture & Recognition (SecurOS FACE), License Plate Recognition (SecurOS AUTO License Plate Recognition), or Container Character Recognition (SecurOS CARGO) provide effective monitoring solutions to the transportation sector. Transportation security provides surveillance challenges in varying degrees of situation and scale, so effective license plate recognition is crucial. From tunnels and bridges where a situation can change in seconds, to regulating traffic flow into a city and capturing a profile of each vehicle, Bosch and ISS can provide answers to the questions that matter. Has a particular vehicle been permitted access to a specific area? Has that vehicle been stolen? What’s the insurance or toll subscription status? Has that vehicle been authorized to operate as a taxi? The capabilities even stretch to large-scale entry and exit points such as ports, borders and airport car parks. The ISS certified Bosch cameras responsible for capturing this data are incredibly robust and built to produce usable images 24/7 in the harshest conditions Cameras With Built-in LPR Mode Monitoring which vehiclesd are entering an area, and checking their legitimacy to be there, has never been more critical. Having the capability to capture license plates of every vehicle moving in the designated area give users complete awareness of traffic flows and usage patterns, allowing them to configure and manage their monitoring preferences efficiently and permit secure data exchanges with other operational management systems and services for efficient infrastructure alignment. If driving conditions were perfect all-year round, the job of an operations manager, for example, would be quite straightforward. But the reality is quite the opposite. That is why the ISS certified Bosch cameras responsible for capturing this data are incredibly robust and built to produce usable images 24/7 in the harshest conditions, including after dark by employing a supplementary infrared light. The selected cameras have a special License Plate Recognition (LPR) mode which is developed in collaboration with ISS to deliver accurate information even when faced with the challenges of glaring headlights and fast-moving vehicles. Utilizing advanced algorithms results in a level of accuracy that can distinguish letters from numbers which is a crucial advantage, particularly in emergency situations Accurate Information In All Weather Conditions High standards are applied to the quality of the images captured. By incorporating the SecurOS AUTO License Plate Recognition (LPR/ANPR) solution Bosch and ISS can provide several unique benefits for users, including the ability to accurately capture license plate information at 210 km/h (130 mph) in all kinds of weather conditions, including light fog, rain, and snow. Furthermore, utilising advanced algorithms results in a level of accuracy that can distinguish letters from numbers (so an “8” is not mistaken for a “B”, for example) which is a crucial advantage, particularly in emergency situations. The partnership with ISS supports Bosch’s belief that the logical next-step for security is to enable customers to repurpose the vast amounts of video data that they now can capture. Interpreting video data directly at source helps to improve levels of security substantially and can also offer clear business advantages.
Matrix Access Control Management is a comprehensive and flexible solution designed to meet access control needs of medium and large enterprises. This access control software allows controlling access on three dimensions simultaneously – user, zone and time, by answering three fundamental questions about who, where and when. In addition, the software ensures security of employees and assets with the help of value-added features like Anti-Pass Back, 2-Person Rule, First-In User, Blocked Users, Door Auto Re-Lock, Guard Tour, Man-Trap and Smart Card based Identification. 65,000 devices and one million Users Web-based software module Centralised monitoring and control Multiple access control policies User, zone, and time-based access Informative reports SMS and Eemail notifications on exception Integration with third-party hardware
A critical issue for security officers today is how to make sure temporary or permanent employees are removed from the employee directory system when they are no longer working for the company. This situation arises especially in large enterprises, which may have different Physical Access Control Systems (PACS) supporting different offices or company operations. It is not uncommon for a company to make an acquisition and have two or more incompatible PACS systems. The simple way to address this is to issue a separate card to the employee to support a different PACS system. While this might be slightly inconvenient for the worker, it is often a simple solution that many companies use. Updating employee information, must be done on each system separately and often manually There are several problems with this solution. There is no central control of identities and they can exist in multiple locations of a company. Updating employee information, for example increasing access to reflect an employee’s new responsibilities, must be done on each system separately and often manually. Unless the company has a strong procedure to support this, the records outside of the main system, may not be updated and errors can occur. This may not be a significant problem if an employee is working for the company, but, if the employee is terminated, he or she may continue to have access to company facilities and systems, potentially compromising security. Physical Logical Access Interoperability - PLAI The Physical Security Interoperability Alliance has addressed this with its Physical Logical Access Interoperability (PLAI) specification. PLAI allows disparate PACS systems to normalize employee identity information and relies on a single trusted source to make changes to employee access and then synchronizes it across disparate PACS systems. The same holds true for a terminated employee. A central trusted source eliminates access, and this is instantaneously reflected in all PACS systems. PLAI offers a simple and cost-effective way to enhance a company’s access control system, providing a more robust security environment. Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI” PLAI Demo at ISC West 2018 A commercial version of the PLAI Agent will be demonstrated by the PSIA at ISC West 2018 on April 12 in Las Vegas. Johnson Controls (Software House), Kastle Systems, and Princeton Identity will show the interoperability and exchange of identity information between disparate systems. “Having a commercial PLAI Agent, available to any company, is an important milestone for PLAI,” said David Bunzel, Executive Director of the PSIA. “It will enable Physical Access Control System (PACS) vendors to have an effective solution for bridging otherwise incompatible systems, saving considerable time in integration, and costs to enterprise customers.” The PLAI Agent was developed jointly by Johnson Controls and Dublin, Ireland-based Cruatech, a new member of the PSIA. It will be available to vendors from either company prior to ISC West. “As an integrator, we are often challenged with client acquisitions and the need to quickly establish a unified security ecosystem.” said Mike Mathes, Executive Vice President of Convergint Technologies and Chairman of the PSIA. “PLAI offers a means to quickly support disparate systems in a robust and reliable manner.” The PSIA has seen growing momentum for commercial implementations of PLAI Identity Management As identity becomes a more critical feature of security systems, finding ways to manage credentials, permissions, limit duplication of records, and eliminating “orphans” left over when an employee leaves a company is essential. PLAI is an elegant means to address many of these issues. “PLAI provides an effective option to reduce problems related to integration compatibility, upgrades, and synchronization which plague the industry today. This is good for both the customer as well as the manufacturers,” notes Jason Ouellette, General Manager of Access Control for Johnson Controls. “Further, PLAI reduces the impact of conflict inherent to the replication of personnel and credential data, while giving an authoritative control of records which can span PACS systems and other integrations to reduce risks in activities such as off boarding.” The PSIA has seen growing momentum for commercial implementations of PLAI. Already the U.S. Department of Justice, The Washington Post, and Corporate Executive Board (CEB) have utilized PLAI. In addition, Microsoft is planning to incorporate PLAI into their security ecosystem. There is a growing list of other organizations which are planning PLAI implementations in the government, financial services, electronics, industrial, and bottling industries.
The Security Industry Association (SIA) has announced, on International Women’s Day, the establishment of the SIA Women in Security Forum to support the participation of women in the security industry. Through programs, professional development and networking events, the committee will engage members, both men and women, who share this goal. The inaugural steering committee for the SIA Women in Security Forum includes (listed alphabetically by company): Elaine Palome, Axis Communications Chelsea Render, Bosch Kelly Bond, Brivo Vicky Lowe, Convergint Technologies Janet Fenner, Dahua Technology USA Sherida Sessa, ISC Security Events Dawne Hanks, Milestone Systems Christie Hamberis, ScanSource Alice DiSanto, Sharp Intellos Maureen Carlo, Videotec Security It is a privilege to serve a forum keenly focused on propelling women within the security industry" Competitve Advantage “It is an honour to serve on SIA’s new Women in Security committee as it recognizes the countless women working in this industry, and our collective achievements and contributions. It also presents a great opportunity to engage, mentor and help further empower a new generation of women executives in the physical security industry,” said Dahua’s Fenner. “It is a privilege to serve a forum keenly focused on propelling women within the security industry. Providing a venue where future female leaders can strengthen their know-how, while networking and brainstorming around future solutions with peers can only improve competency and esteem,” said Sharp’s DiSanto. “Our success depends on the quality skill, and values of our employees. At Axis, we believe that a diverse and talented workforce is a key competitive advantage and that different backgrounds, perspectives, and life experiences are important drivers of innovation. We are pleased to be taking part in this joint initiative with SIA,” said Palome of Axis Communications. Potential Goals For The Forum: Create mentorship/sponsorship programs to advocate for advancement and build confidence in the workplace. Connect women in the industry through networking events. Develop a recruiting program for next generation female professionals and leaders. Initiate an ongoing dialogue between male and female leaders to enhance mutual understanding. Identify platforms that can provide visibility for women. Spearhead an issue that will create opportunities for women to work together and be at the forefront of a major initiative.
Open Options, a provider of innovative access control solutions, has partnered with Telaeris, specializing in emergency mustering systems and handheld badge reading solutions, to provide users an option in their integrated mobile access control solution. “The native integration of XPressEntry with DNA Fusion provides Open Options customers the ability to know where their employees are in the case of an emergency and verify that everyone is accounted for safely,” said Telaeris CEO, David Carta. Flex API Supported Mobile Authentication Telaeris’ XPressEntry, a unique handheld verification and emergency mustering system, natively integrates with the DNA Fusion access control system, enabling a wide range of handheld capabilities. Utilizing Fusion’s Flex API, XPressEntry pulls employee names, photos, access privileges, and credentials and allows guards to visually validate that the credential presented matches the user. Continuous synchronization of activity between XPressEntry and DNA Fusion allows security operators to enhance security and safety by using handheld badge readers anywhere for multiple purposes where wall-mounted readers are not available or possible. In addition to the mobile feature, XPressEntry monitors the occupancy of each building, live tracking entries and exits of all personnel and visitors from both fixed badge readers and ruggedized mobile readers. This information is then available as a live view of who is inside any facility controlled by DNA Fusion. Users may be quickly checked as exited from a building during fire drills, and most importantly, ensure they are safe during real emergencies.
It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging A Curious Incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the truck and challenged the driver who seemed surprised. “Hey, you’re not weighing your truck properly.” The driver fumbled for a response before replying, “Sorry, I was on the phone with a friend. I didn’t notice it.” But this security guard had the presence of mind to demand the driver’s phone. The driver was caught off guard and surrendered the phone. The guard then pulled up the most recent incoming/outgoing calls and saw no calls during the last 30 minutes. “I don’t think so.” “You don’t think so what?” The security guard was frank, “You haven’t used this phone in over half an hour.” The truck driver sheepishly acknowledged the fact. It was decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting Preventing Crime As It Happens Knowing the driver was lying, the security guard ordered the truck back on the scale for a correct weighing and advised the driver that he would report the incident. The security guard wrote up his report and handed it off to his supervisor who, in turn, contacted the local corporate investigator. This investigator was soon on the phone with his boss at corporate headquarters on the other side of the world. Together with Security, they decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting. However, once completed, they waited. They would not have to wait long. For the next two months, the waste vendor trucks, filled to the brim with production waste, black-and-white paper and other waste products from the plant, would stop on the scale only for a moment and then drive the front half of the truck off the scale for weighing. It was obvious that the vendor was cheating the company by only paying for half the waste. After two months, it was decided to catch the next cheating driver “en flagrante.” Sure enough, the next truck went half on and half off the scale and was weighed. Security then asked the unsuspecting driver to park his truck and invited him inside the building to talk to a supervisor. The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet Waiting for the driver in a large office was the local investigator and his close friend, the Head of Security. After a difficult interview, the driver admitted to cheating on the scales over a two-year period—he claimed that some of the scale cheating was done at the direction of the vendor’s management, while some of it he did himself by “ripping off” the vendor—which he acknowledged was dangerous. Working With Authorities The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet—they would see what they could do for him later on. In the meantime, Corporate Investigations had received a due diligence report on the vendor company which contained disturbing news—the company and its managers were associated with a countrywide waste management mafia. The report suggested that the vendor had a reputation for thefts and involvement in numerous lawsuits regarding thefts and embezzlement. Shockingly, no prior due diligence had ever been conducted on the vendor. Fortunately, the plant’s finance and audit team had maintained good records over the past 5 years and were able to re-construct the amount of waste going out the plant door and the amounts being claimed and paid for by the vendor. The discrepancy and loss stood at a multi-million dollar figure. After consulting with the local police authorities and company lawyers, it was decided to pursue a civil case against the vendor. Pursuing Legal Action The regional lawyer, the Head of Investigations, the Head of Security and the CFO invited the vendor to discuss the problem. Some of the evidence was shown to the vendor’s CEO who became indignant and, in order to save face, promised to fire the truck drivers and to repay any losses for the last two months. Inter-dependent entities - security, investigations, finance/audit and legal - combined their resources and agendas to form a unified front That was not enough for the company and a protracted legal battle ensued which lasted several years and resulted in the vendor’s paying almost the entire amount in instalments. The vendor was dropped from the contract and internal controls strengthened—the only plant employee dealing with the waste issue left the company and was replaced by two individuals. The plant also began paying more attention to the waste process and less to the production side. Several “lessons learned” come to mind. First, the tripwire came in the person of an astute and well-trained security guard who exhibited some of the best characteristics you want to see from men and women in that profession. The Security Department was also adept at installing the surveillance system and capturing the fraud live on videotape. But a far greater lesson was learned—of what can happen when inter-dependent entities (security, investigations, finance/audit and legal) within a company combine their resources and agendas to form a unified front. The results speak for themselves.
In 2017, SALTO Systems led the market with increased emphasis on two growing sectors within access control: Mobile technology and cloud solutions. Strengthening Market Positions Mobile access control applications are now a must across all security verticals. The hospitality sector, for example, is quickly seeing smartphones replacing room keys and check-in lines with mobile apps like SALTO’s JustIN Mobile. This technology replaces the need for an access card by securely sending a mobile key OTA from access control management software, to an iOS or Android device. This is an operations time and money saver. SALTO – an innovator in cloud-based access control – strengthened its position in 2017 by acquiring the remaining shares of Clay Solutions, a leading provider of cloud technology for smartlocks. Together, SALTO and Clay developed the technology that SALTO uses in its SALTO KS Keys as a Service cloud-based access control. There are several reasons why the market is moving to the cloud: easier maintenance, scalability, reliability, reduced cost and the ability to use anywhere via the internet. It’s necessary to deploy wireless, technologically-advanced solutions to make cost-effective access control Encouraging Investment In Access Control Continued investment in mobile access and cloud technology in 2018 is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. SALTO has recently experienced tremendous growth in the U.S. and we’re expecting more success in 2018. We’ve added several seasoned executives to the sales team and will continue to do so. We’ve also opened our first two XSperience Centers – in New York City and in Atlanta – that showcase our extensive line of products, and serve to conduct dealer and end-user training. The SALTO team looks forward to increasing focus on residential, multi-family and shared office-spaces, as we know that our wireless electronic lock solutions are well-suited for these growing verticals. In 2018, there will be a continued migration to electronic access control: The winners will offer a reliable product with innovative technology, full support, well-established relationships and a national presence.
News of cyberattacks seems constant these days. Recently, Equifax, a US-based consumer credit reporting agency, announced that a private customer data breach impacted 143 million people. Earlier this year, 1.5 million connected cameras around the world were hijacked in an unprecedented DDoS attack. As cyber-attacks become more rampant, it’s hardly surprising that governments are stepping in to hold organizations more accountable. One of the most recent examples of this is the European Union’s General Data Protection Regulation (GDPR) which is set to come into effect on May 25, 2018. New GDPR Legislation Mandates Essentially, the GDPR mandates that businesses adhere to specific governance and accountability standards in the processing and protection of data. A big focus of this new legislation is that individuals have greater control over their personal data. Contrary to legislations in the United States, the personal data captured by organizations will remain the property of each EU citizen, entitling them to access their own data and have greater decision power over how it is used or distributed. Should a breach occur, companies are mandated to report it to the supervisory authority within 72 hours. Failure to comply with these new regulations could result in up to $20 million euros in penalties, or 4% of the company’s global annual turnover. Territorial Scope Of GDPR So why should North American companies and security directors be concerned? The territorial scope of the GDPR is global. Any business that is collecting or storing personally identifiable information (PII) of EU citizens will be held accountable, regardless of where the organization is based or operating from. This includes any business collecting information from EU residents, or organizations with offices, stores, warehouses or employees in the EU. With the deadline nearing, these North American organizations are seeking strategies that will keep them compliant across all their data collection processes. With a focus on physical security sensors and solutions, below are five steps that North American companies can start taking to become GDPR-compliant. Step 1: Conduct A Data Risk Assessment To better understand the implications of the GDPR, an organization must fully assess the level of risk that its data processing operations pose to the rights of EU citizens. A business should map out how data is collected, where it is stored, how long it is kept, and who has access to it. Identifying and categorising the various types of data is also critical to this evaluation. That’s because according to the GDPR, there is a clear distinction between the high, medium and low-risk data. Through authorization, organizations can define how specific users or groups can use the security system For instance, data derived from a video surveillance system that shows who a person is and where they are is considered high-risk. This could be a retailer that is monitoring video of people coming into its stores or an EU subsidiary office that is recording publicly-facing video footage. Step 2: Hire A Data Protection Officer In cases of high-risk data processing, organizations may need to appoint a data protection officer (DPO). This person must be independent of any IT, risk or VP-level functions and will be responsible for monitoring the organization’s compliance with respect to their GDPR obligations. The DPO will act as the main point of contact for all communications with the GDPR supervisory body. This means that at any point in time, the DPO should also be able to show the steps taken by the organization to protect any collected information. Step 3: Implement Privacy By Design The GDPR mandates that businesses with ‘high-risk data operations’ implement systems that protect privacy and secure data by default. It is therefore critical for these organizations to start talking to system integrators and suppliers about what they can do to harden their systems. After all, cyber security should be a shared responsibility. Organizations should work with partners and vendors to better understand cyber security risks and streamline internal processes such as outlining who has access to the data and identifying why and how long it should be kept. With this understanding, companies can justify adding varied lines of defense such as encryption, multi-layer authentication and authorization. For instance, through authentication, organizations can determine if an entity—user, server, or client app—is who it claims to be, and then verify if and how that entity is allowed to access a system. Through authorization, organizations can define how specific users or groups can use the security system. Finally, encryption protects an organization’s information and data by using an algorithm to make text indecipherable. From device to client application, these security measures help organizations safeguard against cyber threats and unauthorized access. Step 4: Address Data Transparency At any point in time, an EU citizen has the right to request a copy of information pertaining to them from an organization. Upon receiving this request, the company would be required to securely and remotely share video and data files with the individual. A problem could surface if other individuals are visible in this footage. Security solutions that not only facilitate information sharing but also protect privacy can help companies quickly adapt to these new laws. Blurring out faces transfers high-risk data to the low-risk category, allowing organizations to monitor or share video while still protecting privacy One example is having video redaction capabilities to blur out people’s faces in video. This feature transfers high-risk data to the low-risk category, allowing organizations to monitor or share video while still protecting privacy. Companies will also need to provide greater transparency by making points of contact accessible and clearly outlining data management policies. Step 5: Engage Data Processors According to the GDPR, any company that collects and controls private information is a Data Controller. To properly manage the collected data, companies may choose to outsource some of the responsibility to service providers, known as Data Processors. For instance, a retailer could decide to implement a Video-Surveillance-as-a-Service (VSaaS) solution. Some advanced VSaaS providers offer numerous logs and, more importantly, strong reporting platforms that can help Data Controllers and DPOs monitor the state of their video surveillance systems. In some capacity, Data Processors are equally responsible for adhering to laws. Considering the failure to report a breach in 72 hours could result in massive penalties, implementing a VSaaS is a great way to stay on top of potential breaches and decrease compliance upgrade costs. However, it is not a full transfer of risk. The retailer would still be responsible for issuing and managing system access privileges, ensuring password choices are robust, and essentially, limiting data to those who can view or extract it. Counteracting Emerging Threats Through GDPR Compliance With heavy fines looming, it is imperative that North American businesses collecting or processing any EU citizen data begin working on GDPR compliance immediately. Those filming in high-trafficked public spaces are at an even greater risk of penalty if compliance has been ignored. Starting with a comprehensive risk assessment, hiring a qualified DPO, upgrading technology with built-in privacy and security mechanisms, and in some cases, working with data processors can help North American businesses get on track to full GDPR compliance. Regardless of these new laws, these practices will ultimately benefit the organization as a whole, as new threats emerge globally.
A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their grievances, and to suggest alternative solutions, says James Cawood, President of Factor One Inc. “It’s helpful to consider their perspective at a point of time, and how do I use that information in a way that explores the issues and influences them to seek other means of achieving their goals without violence?” suggests Cawood. Preventing Workplace Violence An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator Factor One specialises in violence risk management, threat assessment, behavioural analysis, security consulting and investigations. Cawood will present his insights into preventing workplace violence in a session titled “Workplace Violence Interventions: The Instigator’s Perception Matters” during GSX 2018 in Las Vegas, September 23-27. Intervening and seeking to understand the instigator’s viewpoint can direct them away from violence. Often, diffusing a situation can prevent tragedy. Delaying a violent act is a means of prevention, given that the instigator might not reach the same level of stress again. Cawood says several recent examples of workplace violence illustrate the importance of identifying behavioural precursors and intervening. It is difficult to quantify the benefits of such an approach, since no one is keeping statistics on incident that were successfully diverted, he says. Reaching A Mutually Agreeable Solution “Accommodation and appeasement often won’t serve the problem,” says Cawood. “Instead of projecting our needs on what would be effective for us, we must really understand what matters to them and what we are able to do to solve the problem. “It’s about listening and reflecting back to reach a mutual agreement of their perspective of what matters,” he says. “Now we can talk about what’s possible or not. Is there something concrete I can do that is within the rules? Just being heard in depth is a de-escalator of violence.” It’s the same methodology used by hostage negotiators: Listen, reflect back, and come to a mutually agreeable solution. Giving a troubled employee a severance package – money – might not address their underlying complaints For example, giving a troubled employee a severance package – money – might not address their underlying complaints. “We may not have solved the underlying problem as they perceive it,” says Cawood. “They may feel disrespected or picked on. There may be an underlying mental condition, such as paranoia, or a grandiose sense of self-worth, underlying filters that have nothing to do with money.” GSX Networking And Education GSX is the new branding for ASIS International’s trade show, attended by more than 22,000 worldwide security professionals Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Cawood’s session will be September 24 from 2:15 to 3:30 p.m. “My purpose is to hone in on an area of workplace violence that is often ignored,” says Cawood. Cawood started out in law enforcement in the 1970s and transitioned to security in the 1980s. His credentials are typical of the high level of speakers presenting at GSX 2018: He holds a Master’s Degree in Forensic Psychology, and a Doctorate in Psychology, is a Certified Threat Manager (CTM), and has successfully assessed and managed more than 5,000 violence-related cases. He is the former Association President of the Association of Threat Assessment Professionals (ATAP) and currently the Vice-Chair of the Certified Threat Manager program for ATAP. Cawood has written extensively on the topic of violence risk assessment, and co-authored a book, Violence Assessment and Intervention: The Practitioner's Handbook. Cawood has been active in ASIS International since the 1980s and sees value in attending GSX 2018. “People from all over the world are coming and being exposed to a common set of topics to use as jump-off points for additional conversations. People from all types of experiences and exposures will be providing information through those lenses.” Knowledge gained from GSX provides a “real chance to drink from a fire hose” and get a deeper understanding of a range of topics. The relationships and networking are another benefit: “Nothing is more powerful than knowing someone face-to-face,” he adds.
Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in contrast, ISC West has some 1,000 exhibitors. During the week-long show welcoming 170,000-plus attendees from 150 countries, more than 20,000 new products are being launched. The products incorporate ingredient technologies such as artificial intelligence and 5G that will also be familiar elements as the future of the security industry unfolds. Familiar players at security shows also have a presence at CES, and many consumer technologies on display offer a glimpse of what’s ahead for security The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. Key Security Technologies At CES 2018 Familiar players at security shows also have a presence at CES. For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? At CES, Johnson Controls is announcing support for Apple HomeKit now offered in their DSC iotega wireless security and automation solution. Consumers can manage both their security system and also other home automation abilities using Apple’s Home app, or Siri on their iPhone, iPad or Apple Watch. Interlogix is announcing new features and components of its UltraSync SmartHome system, including hands-free voice control, high-definition cameras, an LTE cellular module and soon-to-be-released doorbell camera. The areas of consumer electronics and security are closely intertwined Developments In Crime Awareness ADT has a high profile at CES, including the launch of its ADT Go mobile app, equipped with 24/7 emergency response from ADT’s live monitoring agents and backed by Life360’s location technology, providing emergency response, family connectivity, safety assistance and crime awareness. ADT is also unveiling a video doorbell and expanding its monitoring to cybersecurity. IC Realtime is introducing Ella, a cloud-based deep-learning search engine that augments surveillance systems with natural language search capabilities across recorded video footage. Ella enables any surveillance or security cameras to recognise objects, colours, people, vehicles and animals. Ella was designed using the technology backbone of Camio, a startup founded by ex-Googlers who designed a simpler way to apply searching to streaming video feeds. It’s a “Google for video:” Users can type in queries such as “white truck” to find every relevant video clip. Smarter homes and smarter computers Do-it-yourself smart home security company Abode Systems announces iota, an all-in-one system giving customers more freedom and flexibility to build out and monitor their smart home. The new form factor has a built-in full-HD resolution camera enabling customers to see and hear what’s going on in their home 24/7 while a built-in gateway supports hundreds of devices to make homes more convenient, safer and more secure. There is also support for Apple HomeKit. Highly programmable and high-performance platforms will no doubt play a role in the future of video surveillance systems in our market The Z-Wave Alliance will host 30-plus leading smart home brands in the Z-Wave pavilion at CES. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience. Sigma Designs unveils its 700-Series Z-Wave platform, including numerous performance and technology enhancements in energy-efficiency and RF performance. Personal protection in attendance Self-defence product company SABRE will debut a combination pepper spray with dual sound-effect personal alarm that “alternates between the traditional wailing sound and a primal scream, while a strobe blinks 19 times per second to disorient assailants.” SABRE’s Modern Fake Security Camera includes “sleek, realistic design to deter would-be thieves.” Chip maker Ambarella is introducing the CV1 4K Stereovision Processor with CFflow Computer Vision Architecture. The chip combines environmental perception with advances in deep neural network processing for a variety of applications, including video security cameras and fully autonomous drones. At CES, applications will focus on automotive uses, including advanced driver assistance systems (ADAS), self-driving, electronic mirror and surround view systems. The highly programmable and high-performance platform will no doubt play a role in the future of video surveillance systems in our market. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience Extending home security and efficiency The Ring whole-house security ecosystem creates a “Ring of Security” around homes and neighbourhoods. Products include “Stick Up” indoor/outdoor security cameras, integrated LED lighting, a “Ring Alarm” integrated bundle for $199 including a base station, keypad, contact sensor, and Z-Wave extender. “Ring Protect Plans” include 24/7 professional monitoring. The “Streety” phone app, from Vivint Smart Home, extends home security into the neighbourhood. Streety makes it easy for neighbours to monitor neighbourhood activity through a network of shared residential cameras. They can keep an eye on kids, cars and property through live video feeds and use recorded video clips to investigate incidents. A new device making its debut at CES is the Walker “commercialised biped robot,” from UBTECH Robotics, which provides a complete home butler service and is designed to ease the day-to-day operations of a busy home or office. The varied of functions includes video surveillance monitoring, security patrol monitoring, motion detection and “instant alarm,” as well as dancing and playing games with children. The company says Walker will “bridge the gap between technologies that were once only available in scientific research institutions and everyday people.”
The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do to ensure they are compliant? These are urgent questions, given that the clock is already ticking. The GDPR’s implications are especially timely considering the physical security industry’s current emphasis on the value and importance of data. The growing value of data was a big topic at the recent IFSEC show in London. The industry is looking for new ways to leverage data for benefits in a company beyond the security department. New Cybersecurity Responsibilities One example is access control data: Who is granted access to which door and more generally, how do employees move throughout an enterprise? This is information that can be useful to managers, whether to analyze facility usage trends or promote more efficient operations. Access control data is especially valuable when combined with other data in an organization, such as human resource (HR) and accounting records. It provides more data points that a company can use in overall metrics to guide business operations. But as the GDPR emphasizes, the value of data and the ability to leverage data come with new responsibilities, specifically a need to protect privacy. This includes a need for additional cybersecurity of networked systems, another current “hot topic” in the market and historically a weak, or at least under-addressed, point for the industry. The GDPR applies to “personal data,” but its detailed definition includes digital information such as IP addresses and a range of personal identifiers. Sensitive personal data, such as biometric data used to uniquely identify an individual, is in a “special category.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage. GDPR Impact On Physical Security Other areas that might impact the physical security industry include requirements to provide information about any transfers of data to other countries outside the EU and the retention period of data and criteria used to determine the retention period. There is also a “right to erasure” that provides an individual a right to have personal data erased if it is “no longer necessary in relation to the purpose for which it was originally collected/processed.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage In the accountability section of the regulation, companies are required to implement “appropriate technical and organizational measures” to ensure and demonstrate compliance. In the category of “data protection by design”, there is a general obligation to “implement technical and organizational measures to show that [a company] has considered and integrated data protection into processing activities.” It is even more reinforcement to the need for more cybersecurity. Data Protection By Design The GDPR endorses the use of approved codes of conduct and certification mechanisms to demonstrate compliance, including codes created by trade associations or representative bodies. There may be an opportunity for organizations in the physical security market to step in and create such guidelines and to clarify best practices as they relate to our market’s technologies. In the category of “data protection by design,” physical security system manufacturers should include data protection and security from the first floor as they are designing new products. Based on several recent conversations, I can say with confidence that these concerns are definitely on the minds of many in our industry. But concerns aren’t necessarily answers, and time is short to fully comply with GDPR by the deadline. And the issue isn’t limited to Europe; multi-national companies that do business in Europe, or even cloud systems that store data there, are also impacted. And even beyond GDPR, data protection is an urgent concern around the world. It’s time to step up.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail Solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent Video Analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognize threats, unauthorized access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete Security Solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
A two-year program to transform security at Heriot-Watt University campuses around the world, facilitated by CriticalArc’s SafeZone technology, has been recognized with one of the UK’s top security industry awards. The innovative partnership between Heriot-Watt and CriticalArc has been named as ‘Security Project of the Year’ in the 2018 Security & Fire Excellence Awards run in association with IFSEC International and Firex International. The award, sponsored by the British Security Industry Association, is highly competitive and a major accolade for the winners. Improving Service Response Two years ago, Les Allan, Heriot-Watt’s Director of Safety and Security Services and his team at the university embarked on a strategy to transform all aspects of their operations. They wanted to modernize their service across five campuses, in the UK, Dubai, and Malaysia to provide much greater care for students and staff. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses It was an ambitious undertaking, but it has already delivered impressive results, measurably improving service response times by over fifty percent, upgrading security department capabilities and skills and raising the job status and remuneration for officers involved. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses, making Heriot-Watt the first university department to take this global approach. Real-Time Incident Management SafeZone technology has transformed the way officers interact with students and staff wherever they are - on campus or and when traveling off-site – so they can provide assistance in case of emergencies or other incidents. Les Allan’s team has already responded to serious medical emergencies using the system and now they have the tools to manage a full range of live-incident risks. “SafeZone lets my team communicate quickly with individuals and groups,” explains Les Allan, Heriot-Watt, Director of Safety and Security Services. “Using it they can receive alerts and pinpoint the location of anyone needing assistance. They can deploy officers more quickly and keep track of ongoing situations as they develop. It’s really letting them do things they couldn’t have dreamed of before.” Better Support For Students & Staff The Heriot-Watt team is also using new technology to support staff and students on campus while traveling and during fieldwork. They can ‘geo-fence’ additional areas as required. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus The result has been a significant improvement in engagement between the security department – now restyled as Safeguarding Services – students and staff. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus (the first to adopt SafeZone); 3542 of these incidents (66%) involved assisting or interacting with students (rising from 33% in 2013). Efficient, Responsive And Capable Services The results have been impressive but Les Allan, who is currently also serving as Chair of the Association of University Chief Security Officers (AUCSO) in Scotland, says his ambition is to go much further. “We are delighted at our incredible success at the Security and Fire Excellence Awards as winners of the Security Project of the Year category. This joint award for Heriot-Watt University and our friends at CritcalArc is a testimony to the power of working in partnership for mutual benefit and delivery of excellence with a world-leading solution. We are committed to continuing development and enhancement of our partnership with CriticalArc.” Darren Chalmers-Stevens, CriticalArc, Managing Director, EMEA and APAC, noted: “I’m delighted that the forward-looking partnership between Heriot-Watt University and CriticalArc has been so clearly successful. This major award is further proof of how we work closely with all our customers and are leading the way in providing better protection and enabling more efficient, responsive and capable services.”
In the booming workspace market, a professional welcome is crucial to success. At Barcelona’s Gran Vía Business Centre, 2,500m2 of offices and shared collaborative workspaces in the heart of the city, managers chose SMARTair wireless access control system — because it protects and manages their premises, and also projects the right image for a contemporary co-working environment. Gran Vía is a flexible and well-equipped home for companies from international corporates to local start-ups. Fiber optic broadband, LED lighting, an on-site restaurant and adjacent rental apartments are also part of Gran Vía’s high-end service. This is why, they sought an upgrade and replacement for an existing, out-of-date access control system. SMARTair Access Control Locks SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areasGran Vía needed more flexibility and control over access to their premises; a system to seamlessly manage diverse access needs of permanent versus temporary users, and that would cope with rapid personnel turnover. Locking devices must complement the professional, modern image of the workspace, which attracts high-profile, design-savvy business clients. On top of these demands, any new system would have to be fitted without disrupting day-to-day business. SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areas. Access requirements change all the time at the business center, and security managers now have a system where programming and reprogramming access rights is fast and easy. Thanks to the slick, flexible management software behind SMARTair, everything works in the background — keeping site users safe almost without anyone noticing. "SMARTair is an effective solution that is easy to use,” says Esther Portillo, Marketing Director at Gran Vía Business Centre. RFID Operated Wireless Escutcheons SMARTair wireless door and wall devices complement Gran Vía’s contemporary aestheticOver 50 new SMARTair wireless escutcheons are operated with RFID smart-cards, so security is not compromised if an office user loses their credential. Security administrators simply cancel the lost credential’s access rights — much quicker, cheaper and more professional than replacing a traditional mechanical lock. The user gets their new smart-card validated at one of five SMARTair wall updaters: it is the perfect combination of contemporary image and efficient user experience for Gran Vía’s clients. Importantly, SMARTair wireless door and wall devices complement Gran Vía’s contemporary aesthetic. “SMARTair has a modern design and suits our installations perfectly,” confirms Esther Portillo. Bringing more doors into any installed SMARTair system is straightforward, because SMARTair escutcheons fit wood, glass, emergency exit and fire-resistant doors. Gran Vía now has an access control system they can reconfigure and expand to suit both their needs and their clients’.
IDF Aluminium has installed transom closers and latch locks from Alpro Architectural Hardware at a building that provides premium co-working and flexible office space in central London near Victoria Station Thomas House in Eccleston Square is a seven-story structure with a facade in Regency style and a distinctive timber-clad reception that leads to two wings. It has collaborative drop-in work areas, meeting rooms and facilities to suit present-day practices. The building has been refurbished for The Office Group who pioneered shared workspaces in Britain and now offers these services across multiple London locations as well as Bristol and Leeds. Hydraulic Door Controls The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminum doors The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminum doors. They allow precise adjustment of the latching and closing force generated by the valve according to the weight and height of individual doors as well as type of usage. Aesthetics are a major consideration for The Office Group who briefed Soda Studio, an architectural practice known for its clean simple interiors, to create a design in keeping with the neighbouring Georgian squares. In addition to the working facilities, Thomas House has a library, music room, roof terrace and gymnasium. It is named after the early nineteenth-century architect Thomas Cubitt who created much of the surrounding area and also designed the eastern front of Buckingham Palace. Preserving Interior Geometry Fabricator IDF devised a solution featuring tailored SBD aluminum profiles from Jack Aluminium Systems, bespoke glazing, internal screens and the Alpro door management. The Alpro products include Europrofile cylinder deadlatches which can be combined with electric strikes to provide the added option of remote access control. All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House" Peter Keen, sales director at Alpro, said: “Installing transom closers on internal doors is unusual but the concealed nature of these closers, within the transom header bar, means they are unobtrusive and meet the architect’s goal of preserving interior geometry.” He continued: “All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House, a former BBC building in the West End. Our transom closers are durable and have been tested independently at 250,000 double-action cycles.” Commercial Door Market IDF specializes in the design, manufacture and installation of aluminum doors. The door projects are often in commercial and public sector environments where usage may be high but maintenance costs must be minimized. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
A concierge orders a taxi for an employee or takes his shirts to be cleaned, then greets a visitor and escorts her to an elevator. And these are just a few of countless possible examples of the NOVE office complex’s unique, multifaceted service culture. It attains the standard of security, efficiency and comfort of a five-star international hotel in a state-of-the-art facility where 1,300 people work for no fewer than eight different companies in the heart of Munich. The NOVE has even been honored with platinum certification from LEED (‘Leadership in Energy and Environmental Design’, a program developed by the U.S. Green Building Council to encourage the construction of energy- and resource-efficient, healthy buildings). Completely Integrated Solution Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts “We wanted an office building that felt like a five-star designer hotel,” says Tim Wiesener, the CEO of Salvis Consulting AG. The company envisaged a high standard of security backed by smart networked solutions that blended smoothly and esthetically with the architecture and interior decorating. “We certainly didn’t want employees and other users of the building to feel bothered or overwhelmed by its technology.” Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts. “Bosch applies both experience and foresight to its projects, and its specialists immediately grasped our vision.” Video surveillance, access control and intrusion alarm systems, fire protection, visitor management: Bosch planned and implemented a completely integrated solution that harmonised with NOVE’s character and personality. Its leading-edge technology and software are distributed and networked across six stories, a 23-meter-high atrium, and a nine-floor tower. Manage Video Surveillance The concierges working shifts at the 24-hour reception play an important role in the overall concept, since they are also trained security experts. Among other things, monitors behind the counter let them keep a watchful eye on images from over a hundred surveillance cameras that can be remotely controlled, zoomed and pointed as required, all courtesy of the Bosch Building Integration System. The software lets them efficiently manage video surveillance as well as fire and intrusion alarms. Around-the-clock assistance is also available to the 300 or so visitors that enter the NOVE each day, aided by the dedicated BoVisit visitor management system. The software’s functionality includes announcing guests, printing name tags for them, and assigning them to employees. Thanks to a centralized solution, the concierges always know who is where inside the building. Visually Integrating This is especially important in case a critical situation ever arises. At the press of a button, the system generates a vitally important overview of how many people need to be evacuated from each area. Not everything the concierges do is high-tech, of course; they are devoted to helping both tenants and visitors with a smile. “Our receptionists are efficient but not nameless. We combine security with personal service,” says Tim Wiesener. Tenants can naturally access the NOVE any time of the day or night Italian star architect Antonio Citterio designed the complex, which spans roughly 27,500 square meters of gross floor space. He paid especially great attention to visually integrating the security equipment so it wouldn’t stand out. “This called for a certain finesse,” explains Tim Wiesener. Networked Solutions Tim Kosok, a sales representative with Bosch Energy and Building Solutions in Munich, worked hard to find out exactly what the customer wanted, explaining that “we painted installations the same color as the ceilings or walls and positioned them just right so they would be practically invisible. Even the door intercoms are designed to be inconspicuous.” Tenants can naturally access the NOVE any time of the day or night. Tim Wiesener is confident that everyone consistently feels safe there, thanks to the networked solutions. “Our collaboration for implementing the complex was excellent and collegial. We worked closely with the Bosch experts to create a solution that’s geared to people and their needs.”
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorized visitors. Using Smartphones For Access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating All Building Applications Into One “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organizations are leveraging the power of mobile credentials and the cloud to realize the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”