Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
Check Point® Software Technologies Ltd., a foremost provider of cybersecurity solutions, has announced that it has become a strategic partner of FinTech Scotland, an independent not-for-profit body jointly established by the private sector and the Scottish Government. Check Point solutions bring a practical boost to cybersecurity awareness and engagement with Scottish fintech firms. The collaboration will offer industry-leading security solutions and education and training resources to hel...
Safetrust, a pioneer in virtual credential solutions, and AlertEnterprise Inc., the foremost physical-logical security convergence software company, have entered into a strategic partnership to deliver next-generation digital access credentialing and controls, providing frictionless, safe, and secure workspace access experience for employees, contingent workers, and visitors. Benefits of collaboration The collaboration reinforces the new way businesses are defining smart and healthy workplaces...
Vanderbilt, a provider of state-of-the-art security systems, announces the release of ACT Enterprise 2.14. ACT Enterprise is the company’s award-winning access control software that has a wealth of features and integrations. The latest additions in version 2.14 include extended integration with KONE and new video integration with Hanwha. The software has also added contact traceability reporting to its suite of tools. For instance, thanks to contact traceability reporting, users of ACT En...
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and ar...
LenelS2 announced the release of its Mobile Security User app that enhances safety, security and convenience. LenelS2, a global leader in advanced security systems and services, is a part of Carrier Global Corporation, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. The Mobile Security User app offers a wide range of security features to LenelS2 NetBox™ ecosystem users. With the Mobile Se...
Master Lock, the American security super brand, is excited to announce the launch of the Biometric Security Safe to join the brand’s expanding easy access range. Following the success of the Biometric Padlock that launched earlier in 2020, the new Biometric Security Safe offers a practical solution to security at the touch of a fingerprint! The Biometric Security Safe is the ideal home and office solution for protecting precious valuables and electronics against theft. The biometric lock allows users to store up to 30 fingerprints there is no need to memorize tricky combinations or codes. Protection against attacks There is also no danger of keys getting into the wrong hands or becoming lost. The security mechanism comprises of two steel motorized bolts and a concealed hinge for increased protection against attacks and prying attempts. The body of the Biometric Security Safe consists of a solid steel construction for a robust outer layer. The interior features a carpeted floor to prevent the contents from scratches during storage and a handy interior light for added visibility in the dark or low light. Additionally, since the Biometric Security Safe does away with fiddly keys, it is a great security option for those that suffer with joint pains as gaining access does not require any uncomfortable twisting. It is also useful for the more forgetful who might misplace keys or misremember codes as all that is required is a fingerprint. Integrated battery jump kit The safe requires 4 AA alkaline batteries to operate which are easily accessible and replaceable Thanks to an integrated battery jump kit and set of two override keys, users can rest safe in the knowledge that they can always have access to the safe, even in the event of flat batteries. The safe requires 4 AA alkaline batteries to operate which are easily accessible and replaceable. Boasting a large interior 25.4 liters capacity, the Biometric Security Safe is suitable for storing a wide range of precious items and electronics such as passports, cheque books, small electronics like cameras, tablets, laptops and important A4 sized documents. The neat size makes it ideal to integrate into a variety of existing pieces of furniture such as wardrobes, desks and cupboards making the safe easy to conceal from sight. Master Lock’s 90-plus years of security expertise means users can rely on a product that has been perfected and designed from the ground up by a team of dedicated security professionals at the brand’s headquarters in Wisconsin, USA.
If one has ever settled a check for changing one’s office locks and thought if there were a better way. In fact, there is. Access control and digital keys are easier and more cost effective than one can imagine. While mechanical keys will keep a building secure, they lack the flexibility to adapt to one’s changing security needs. Standard physical keys are difficult to track without a key management system. Physical Keys When a key goes missing, changing a standard mechanical lock or rekeying is time-consuming and often expensive Some types of key are quite straightforward to cut without permission. And when a key goes missing, changing a standard mechanical lock or rekeying is time-consuming and often expensive — 100€ or more every time. Yet the alternative — electronic access control — can seem daunting, over-technical and potentially expensive. But this need not be the case, if one chooses the right wireless access control system. The basics of digital locking Best wireless access control systems lets one choose the format to suit one’s business Everything begins with the credential — the digital key one’s building users will carry at all times. Credentials can be plastic smart cards, fobs, wristbands or even stored in a secure cellphone app. The best wireless access control systems lets one choose the format to suit one’s business, and even to mix different types of credential in the same building. When one swaps keys for credentials, one brings enhanced flexibility to building security. Most importantly, if someone loses their credential, one can cancel it with a click. One would never rekey or change the locks again. Access control system for intrusion detection One can program and reprogram credentials and wireless door locks as many times as one likes Electronic access control is highly flexible. So, if some staff should have access everywhere, but others only through the main door, it is easy to program the system to allow just that. Plus, one can program and reprogram credentials and wireless door locks as many times as one like: employees leaving or joining the company create very little workload. If the worst happens and there’s an unexpected incident — unauthorized intrusion or theft — an access control system helps one handle it quickly and efficiently. Because everyone carries personalized credentials, the system software will tell one who went where and when. Yet another occasion when wireless access systems save time and money. Wireless locks for workplace security It takes only one day to switch a medium-sized office from mechanical lock-and-key security to digital credentials A modern, wireless system with digital door locks, programmable credentials and user-friendly software (to keep it all running) is easy, affordable and fast to install. It takes only one day to switch a medium-sized office from mechanical lock-and-key security to digital credentials. There’s no major cabling, no major adjustments around one’s existing doors and almost no noisy, dirty drilling. All over Europe — at offices and sports venues, schools and university dorms, co-working spaces and medical practices — SMARTair wireless locks have transformed workplace security. SMARTair management software SMARTair battery-powered cylinders, escutcheons, security locks and readers are fast to fit and can protect almost any door or access point, from boardrooms and storerooms to fire escapes and lifts. Little or no training is needed to use SMARTair’s management software: when one’s installer departs, hardware and software will be ready to go. One spends six months of one’s lives looking for lost things. Metal keys don’t have to be among them. SMARTair wireless security turns mechanical labours into key-free, happy workplaces.
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a priority - such as retail stores, educational and healthcare campuses and corporate offices. Enhanced situational awareness With exacqVision’s automated event notification features, it’s easy to monitor, link and search No Mask events, providing businesses with enhanced situational awareness to respond quickly when a person without a required face mask is detected. This ultimately allows businesses to be more proactive about reducing risks and ensuring compliance to new norms. Additional features include: More efficient and streamlined than placing employees at entrances to ensure compliance Alarms can be triggered based on the absence of a face mask Open camera support Real-time event monitoring, linking and searching
Davista, a provider of artificial intelligence for physical security and law enforcement, announced the availability of its AI-powered social distancing platform. The solution is designed to help businesses, organizations, and government agencies ensure social distancing efforts to keep individuals safe while promoting a healthy return-to-work. Across the globe, governments, corporate entities, and health and law enforcement agencies are working to find solutions to COVID-19 while making strides to get their local economies back up and running. AI-driven technology Heimdall is designed to help organizations proactively identify threats, find strategies to combat them Since the virus can be transmitted through close proximity to affected individuals, public health officials have identified social distancing as a proactive approach to help contain its spread. When combined with the ability to identify individuals who may be infected with COVID-19 and who they were in direct contact with, AI-driven technology can help organizations react proactively if an outbreak occurs. Based on Davista’s flagship Heimdall platform, the social distancing platform is based on Bluetooth and GPS technologies and manages the process of identifying individuals who come in contact with individuals who may be infected. Heimdall is designed to help organizations proactively identify threats, find strategies to combat them and identify potential trends to identify based on their specific environment. Platform with predictive intelligence The customizable platform combines a multitude of data sources and uses predictive intelligence The customizable platform combines a multitude of data sources and uses predictive intelligence to best deploy physical security or law enforcement personnel, assets and technologies. It can be configured to address evolving risks and security and compliance requirements, and easily add new configurations to support applications like the social distancing platform. Employees running the Heimdall Social Distancing app on their smart devices will receive alerts when they come close to other employees. The system will also enable employers to trace, monitor, and manage their organization’s overall social distancing environment. Proactive risk mitigation strategies The AI engine can be configured to automatically record the user's location as well as the user’s “bread crumb” trail The AI engine can be configured to automatically record the user's location as well as the user’s “bread crumb” trail for proactive risk mitigation strategies. If an individual exhibits COVID-19 symptoms, organizations can quickly find and isolate the correct employee, map the user’s trail via their mobile device and identify who they came in contact with. "Davista is committed to helping organizations across the globe gain access to the technical tools required to help combat the virus and ensure streamlined health monitoring to support the re-opening process," said Scott Sieracki, Chief Sales and Marketing Officer, Davista. "Our team believes there has never been a more important moment to engineer solutions to solve this challenging process. Through close cooperation and collaboration with our customers, we look to harness technology's power to slow the spread of COVID-19 and accelerate the return to everyday life." Key features Drawing on its years of experience in the engineering of AI-enabled solutions, Davista can automate the process of social distancing and security leaders and law enforcement help identify people potentially at risk through: Geo- and Bluetooth-enabled TracingBuilt upon the latest technology protocols, Heimdall utilizes both geo-location aware and Bluetooth based technology for enhanced contact tracing and can leverage a customer’s wireless access points (WAP) and other technologies for optimal location awareness. Automated Stakeholder AlertsStakeholders receive automated alerts based upon predefined conditions informing them of what they need to know and when they need to know it. n-th Degree Contact TracingQuickly locate people who contact potential COVID-19 individuals by using advanced filtering options and contact link visualizations. Privacy-preserving Data CollectionQuickly deploy in a building, campus, or agency-wide setting and employ Heimdall's geofencing and data anonymisation techniques for privacy preservation.
HID Global, a worldwide provider in trusted identity solutions, unveiled its new HID® ELEMENT product line, the industry’s heavy-duty, fully modular desktop-based card personalization portfolio that establishes a new category for mid-range and high-volume market segments. The portfolio’s enhanced card production capabilities, flexible system architecture and cost-effective deployment model empower organizations to create custom secure ID and financial card production solutions for a variety of use cases and applications. For government entities and financial card issuers “From government entities to financial card issuers and service bureaus, customers around the world have unique card personalisation and issuance requirements where traditional direct-to-card printers and large production machines may be too cost- or space-prohibitive,” said Craig Sandness, Vice President and Managing Director of Secure Issuance with HID Global. “By bridging the gap between desktop printers and central issuance machines, our HID ELEMENT product line pioneers a new approach for delivering a host of highly configurable options that address current and evolving customer challenges.” The HID ELEMENT portfolio delivers optimal card personalization and accommodates projects that require high-resolution UV ink printing, laser engraving or both. Designed to serve government and financial institutions, medium-to-large enterprise corporations and service bureaus, its features address the demand for greater print speed, higher resolution, larger card output and better cost-per-card economy. Key features Key product line features that enable a variety of configuration options include: Precision UV-cured, Drop on Demand (DOD) inkjet card printing: Options span full-color over-the-edge or monochrome text and graphics printing, with as many as six configurable ink channels. Users have options for custom colours, fluorescents, and color tactile effects. Laser engraving system for tamper-proof, high-durability card personalisation: Deliver secure sub-surface or tactile effect black markings and precise greyscale imaging in a laser engraving-only system or combined with a color UV ink module. Multiple card encoding options: HID OMNIKEY® or third-party (Smartware®) contact and contactless reader and programmer functionality and magstripe support. Lenticular personalisation: Multiple/Changeable Laser Image (MLI/CLI) engraved images or data shift with the viewing angle for convenient authentication. Optional modules: Additional input/output card hopper for a total capacity of as many as 1,600 cards and a camera system for registration and verification.
Alcatraz, the developer of secure autonomous access control products, and national security integration provider SAGE Integration have partnered to deliver facial authentication solutions to enterprise businesses to help modernize access control. Headquartered in Kent, Ohio, with a regional office in Atlanta, SAGE Integration will develop and expand Alcatraz’s presence along the East Coast and in Midwestern states. “We’re excited to partner with SAGE Integration to work together on modernizing access control solutions. SAGE is a powerhouse that brings a client-centric approach to the services they offer and therefore understands and appreciates the Alcatraz Rock platform and its ability to deliver autonomous access control,” said Alcatraz’s Chief Revenue Officer, Tina D’Agostin. Biometric-based access control solutions SAGE Integration is a national security integration provider serving enterprise clients with the mission to protect their people, facilities, and reputation. SAGE was created to advance the industry, moving beyond boiler-plate solutions. SAGE brings creative ideas and on-the-ground support to prepare for and mitigate the kind of integrated challenges that their clients face every day. “Touchless, biometric-based access control solutions are in high demand,” said John Nemerofsky, chief operating officer, Sage Integration. “The Alcatraz platform, which accurately authenticates identities using facial recognition, is ideal for our enterprise customers. We look forward to partnering with Alcatraz to offer the solution.” Secure physical access Alcatraz offers a touchless and secure physical access control platform that works with any access control system. It replaces or augments badging as a credential with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses passive 3D sensing, machine learning for increased security, and accurate tailgating detection while intelligently enroling employees as they are badging in, eliminating the headaches associated with traditional enrolment. A newly added mask enforcer feature offers businesses the ability to comply with increasing state-mandated mask orders.
We’ve just endured an event that was unprecedented in recent history. COVID-19 greatly affected our lives: our daily activities, the health and well-being of our families and friends, and business operations as we know it. Now that stay-at-home restrictions have been lifted, organizations are preparing for employees to return to work. Confidence surrounding the return to the office hinges on the employees’ perceptions of how well they will be protected while at work. One thing is certain: There is a lot of work ahead. Let’s look at some of the challenges enterprises can expect to face and how to best address them. Addressing the Return to the Office To say that the COVID-19 pandemic has disrupted operations around the world, is the understatement of the decade. That being said, businesses and governments are under mounting pressure to restart their operations as quickly as possible. With ‘social distancing’ and other measures helping to curtail the spread, organizations are turning their attention to a critical question, “How do we effectively restart operations, while protecting our employees’ and citizens’ health and safety?”As organizations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control In the absence of defined contingency plans, industry standards or regulatory guidance, organizations are looking for innovative ways to help address a host of new challenges. Businesses are not just focused on response or monitoring of hot zones during the pandemic; they’re also thinking about afterward, when people return to the daily activities and the workplace under a different, new set of circumstances. Embarking on this journey and being successful requires a key element: the insight to adapt. As organizations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control: their employees’ safety, operating models, and existing compliance requirements. Building Confidence Adjusting these elements demands a pragmatic approach that addresses the potential risk to employees in various environments while also delivering a degree of confidence to customers that an organization is taking a meaningful, proactive posture to keep people safe and healthy. Also, as circumstances change, obtaining the insight to adapt to those changes is crucial for businesses to stay one step ahead and remain agile. One example of this, that we expect to impact the future of business, is the increased use of mobile applications to provide remote health checks of employees while delivering push notifications of wellness tips, rapid communication when issues arise, and response to a call for help in case of emergency changes in health status. Employee monitoring To illustrate the point, having employees provide current symptom status and temperature before arriving at work can help to establish a baseline. Upon arrival, they complete a quick check-in to verify the information before entering the premises.It is important to remember that private health information is being shared, requiring adherence to existing privacy requirements In this instance, it is important to remember that private health information is being shared, requiring adherence to existing privacy requirements, documentation, record keeping and accuracy checks. Doing so manually is a significant challenge, hence the need for a systemic approach. Organizations are looking for applications that map to their current needs, can scale to larger populations as needed and remains adaptable to emerging requirements and legal mandates as they evolve. We expect to continue to see new use cases like this evolve as organizations implement new approaches to daily operation. Regardless of the use case, the underlying driver is that access to information and flexibility is critical and the ability to respond quickly is vital. Looking to the Future As we all adjust to different ways of operating, business and security leaders need to keep a few guidelines in mind. First, it is critical to identify the mission-critical challenges that are most relevant to your operations. What works for an organization down the road, may not work for your business. Next, you need to implement processes and policies that are flexible enough to fit your situation, scalable to larger or smaller groups and adaptable to new requirements be they regulations, standards, processes or new technologies. And lastly, above all else, be pragmatic. The solution should not be worse or more complex than the problem. As we move out of this phase and into the weeks, months and years ahead, there is hope. By empowering your team and the overall business to realize stronger risk awareness, deeper threat detection and prevention, and broader visibility, you can develop a return-to-work strategy that enables you to get your operations up-and-running quickly and efficiently.
Across the world, the impact of the current pandemic has majorly disrupted how we function in our everyday lives, as a society, and the ways in which we do our jobs. Throughout, our personal safety and wellbeing, as well as that of our families, neighbours and colleagues, has been paramount - and adapting our day-to-day lives to meet social distancing measures has been a learning curve for us all. As we start to reassemble normal life, precautionary measures will continue to be put in place to achieve the universal aim of mitigating the spread of the virus as much as possible. As different countries reach new stages of this process, some parts of the world continue to live and work in lockdown, while some are beginning to open up. This means governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection as more people begin to return to the outside world. Tracing the spread of COVID-19 Of course, this will need to be driven by higher-level support from leaders in government, healthcare and technology to develop innovative ways of tracking and tracing the spread of COVID-19. From contact tracing solutions, to self-reporting apps and thermal screening cameras – governments and businesses across Europe have a new responsibility to seek and reinforce the most effective ways to ensure people’s safety. These measures are particularly pertinent to those reopening their doors as lockdown eases, and those returning to a daily routine of commuting to and serviced office spaces. As more and more people begin to move through public and commercial areas, we will rely more on technology to run in the background to ensure safety and wellbeing is monitored - much like that of the everyday CCTV camera. Thermal temperature screening cameras One piece of technology that we can expect to see as more commonplace is the thermal temperature screening cameras and monitoring system. An example of this kind of device, is D-Link’s recently launched all-in-one, intelligent fever screening kit – which includes a dual-lens thermographic camera, blackbody calibrator, as well as integrated management software. Governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection The premise of temperature screening cameras like this one, is to harness thermal imaging technology coupling it with AI to identify if a person is experiencing elevated temperatures, and raise the alarm automatically when someone at risk of spreading is detected. To monitor the progression or depletion of COVID-19, technologies such as AI facial recognition will play an important role in mitigating the risks of the virus spreading. Thermal cameras that use AI can easily capture and manage employee’s temperature and stop their entrance if a fever is detected. For this reason, such devices are normally installed in a doorway or entrance to a building to quickly detect and identify those displaying symptoms before entering a building. This type of surveillance will be detrimental to the management of COVID-19 in the world of a ‘new normal’ – as companies feel their way out and learn as they go along with people’s health and wellbeing continuing to be center of the mind. Just as lockdown has had an impact on physical as well as mental health, so too will the adjustment to living life post-pandemic. Not only in getting used to and dealing with the emotional and mental pressures of life on the ‘outside’ as they leave lockdown, but they also face the very real risk of contracting the virus and the worries they may have of spreading it. Appropriate installation of temperature screening Companies and organizations have a responsibility in these times to play a supportive role towards employees, such as allowing them to continue working from home until they feel comfortable to work in an office setting. Equally, as restrictions ease, employers have a duty to make the workplace a safe place that is able to uphold the wellbeing of staff, which is where, as we wait for a vaccine, we must make use of the available technology. However, in the case of the thermal camera, in order for it to deliver effective results, it must be installed appropriately. To support this, we have outlined some key points to consider when deploying a temperature screening camera here: Choose a solution that features a blackbody calibrator – a vital part for any temperature screening device. A blackbody calibrator is the basis for accurate calibration of infrared thermography devices and allows the device to accurately detect a fever. Check for facing windows or doorways and heat sources such as radiators as these increase the risk of stray heat or cold sources throwing off readings according to the ISO standard associated with this type of equipment Be wary of weather and changes in climate as the device will need time to acclimatise – in order for readings to be clear individuals coming in from outside must wait five minutes before being screened When mounted, the camera must face individuals head-on and in parallel with their face to capture the inner eye area which is crucial for temperature reading Consider an option using AI which will automatically recognize individuals based on photos in the system Check applicability and legality of temperature screening cameras before deploying There’s a long way to go before life will fully return to normal. In the meantime, and to help everyone along the way, it’s essential that the right measures are in place to protect the physical and mental wellbeing of those we are responsible for. For anyone who is exploring options, know that there is help out there to provide guidance and expertise on the solutions that will be right for you and your business - now, as we go through the remainder of lockdown, and as we slowly move back into everyday lives.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically Recognizing Gun Threats Actuate offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. The technology is centred around a CNN that aims to replicate how a human brain would process information Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances Law Enforcement Response Tai says Actuate helps to clear up that chaos and confusion. He says: “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with. This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More Than 99% Accuracy In Detecting Weapons Actuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping Customers With AI Tools As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. Our current focus for the company is to get our technology into the hands of as many customers as possible “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
Boutique office company, Office Space in Town, has selected Opem Security to install SALTO Systems to provide access control for its newest serviced office development in London, Blackfriars. The company offers businesses and individuals flexible workspace solutions, providing serviced offices, co-working space, meeting rooms and virtual offices in London, Cardiff, Northampton, and Edinburgh. designed meeting rooms Affectionately named the ‘Happiness’ building, this vibrant and quirky, new serviced office development is located in Tudor Street in the heart of London’s prestigious Midtown district. The building has undergone an extensive £8.5 million refurbishment that has transformed it into affordable uniquely themed, high-spec luxury offices intended to help boost productivity and wellness in a professional, HQ quality standard office – created for those who appreciate style with a twist. The building now incorporates over 475 workstations split over five floors The building now incorporates over 475 workstations split over five floors, each with its own individual color treatment. The building also boasts nine individually designed meeting rooms – each based upon the theme of ‘what makes you happy’ ranging from a quirky hot air balloon designed room, through to an aquatic haven, deep down ‘under the sea’. Controlled air conditioning It is also the first building in the UK to feature Clear View Dynamic Glass - intelligent, electrochromic windows that automatically tint to maximize natural light and reduce heat and glare. The building also boasts the most-up to date technology, enabling it to achieve a Wired Score rating of Platinum, high standard soundproofing and individually controlled air conditioning, to support clients’ growth and business needs. Sara Chegwidden, Chief Operating Officer (COO) for Opem Security says “Right from the start of this project, the client wanted to incorporate the latest technology into the development. This meant that security for the building also had to be top notch, and that the access control system chosen had to be a technologically modern locking solution that would satisfy the needs of both the business and its users.” Integrated electronic locking SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution “It had to be wire free with no cabling requited for network points etc alongside the requirement to be able to grant access rights instantly and revoke them in real-time if and when required. An audit-trail overview of who accessed which door at which time together with easy installation completed the requirements. So, after a site survey and listening to how the customer wanted to operate and manage the building we recommended SALTO as the best product to fit the brief.” SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution that bring seamless access to every door in any building in an efficient, safe and secure accessible way. Building operating requirements It’s tailored to the customer’s needs and building operating requirements and designed to give users ultimate freedom of choice regarding system layout, type and number of access points as well as level of security. It enables users to incorporate the functionalities they need now, and upgrade accordingly as and when their needs grow. Security risks related to lost keys are completely eliminated and system operators can manage every door and user access plan from powerful web-based management software. Both staff and customers can open doors with convenient and flexible credentials; smart key card or by smart phone if required. There are no costs from lock replacement caused by lost keys, which saves valuable time and resources across the organization. Operating smart cards Controlling access plays an important role in the security of any building The new security system is now installed, with a total of 88 doors across a mix of communal doors, offices, meeting rooms and exit doors secured by XS4 original narrow body smart handle sets and SALTO wall readers. Controlling access plays an important role in the security of any building and SALTO’s Innovative, wire-free technology allows stand-alone electronic locks to read, receive and write information via their operating smart cards. And, if the client chooses, they can also incorporate the use of JustIN Mobile technology making it easy and secure to incorporate smart phones as a part of their access control solution. Access control solution Office Space in Town’s Developments Director, Simon Eastlake, comments, “From initial investigation through to building wide deployment, Opem Security have provided an excellent service. SALTO now provides us with a robust future proof access control solution that allows for the integration for third party systems as well as wireless doors and mobile tech as we wish.” Jason Pelham, Founder and Chief Executive Officer (CEO) for Opem Security concludes “The combination of the SALTO SPACE platform together with competent engineers and clarity of direction from such a professional client ensured this project was a pleasure to work on. The installation was straightforward and this ensured we delivered the project on time and fully met Office Space in Town’s security expectations.”
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbor, Sydney Opera House, and Sydney Harbor Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf, and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 meters-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorized people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. This project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-meter room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimeters forward of a 5.2-meter wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimeters. The second desk is a single-bay dual-screen unit measuring 1.5 meters wide by 1-meter front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-colored Marmoleum with black PVC edging and silver anodized aluminum legs. The supervisor's desk faces a 76-centimeter high printer support unit with a 60 by 60-centimeter top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-meter wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
SMARTContactless, a value-added distributor for contactless solutions, ABS Technology and STid have been selected by INIT Innovation in Transportation Inc., a US provider of intelligent transportation systems for public transit, to create new cellphone access control for its employees and visitors. STid Mobile ID, pictured, from the access control product company STid, is a Bluetooth access control reader. Common supported credential technologies are MIFARE, MIFARE DESFire EV1/EV2, NFC and STid’s cellphone credentials using smartphone and Bluetooth for communications. The solution includes a free cellphone app, the latest multi-technologies Architect Blue readers, and offline and online programming tools. Mobile Access INIT Innovation in Transportation Inc. has installed numerous STid’s Architect Blue readers at doors and entrances to secure their new Corporate head offices. Employees and visitors use STid’s patented identification mode features and can access the building or other sensitive entrances within the offices, without taking their smartphones out of the pocket or bag. Jamie Thomas, Systems Engineer for ABS technology in Virginia Beach, Virginia, says of the STid Mobile ID: “This Bluetooth reader has so much technology built into it; it’s future proof, easy to install and program.” Feedback on the cellphone access has been positive and INIT USA Inc. is exploring the STid Mobile ID’s options to remotely assign and revoke cellphone credentials to employees and visitors over the air. Access control solution INIT USA Inc. Director of IT, David Page said: “As a provider of innovative technology to our public transit customers, INIT desired an access control solution which mirrored our innovative technology solutions, matched our company culture, and was simple to install and administer. In addition, we wanted the ability to start with a small proof of concept and eventually grow it as this type of technology inevitably transitions to a fundamental employee expectation instead of a bleeding edge innovation.” RFID reader solutions Robert Gailing, President of SMARTContactless, STid’s US Distributor said: “STid is really leading the market with innovative RFID reader solutions for security-minded professionals and end-users. The new STid Mobile ID reader solution, with its five methods of cellphone credential presentation using the smartphone and customizable distance to 60 feet, there is virtually nowhere the reader cannot be utilized throughout any access control deployment.” According to Vincent Dupart, CEO of STid, this new implementation is a testament of the growing smartphone adoption that merges security and convenience. “We are pleased that both INIT USA Inc. employees and managers are enjoying the experience. We are also proud to work with strategic partners like SMARTContactless, offering high-quality customer support to promote our cellphone access solution. The ability to use smartphones for high-security access control is becoming increasingly important, as these devices are part of our everyday lives in the business workplace.”
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that 32-41 West Street, a retail headquarters building in Reading, United Kingdom, has upgraded the building’s entrance with an energy-saving revolving door and an array of optical turnstiles for increased lobby security. Nestled in Reading, Berkshire, in the United Kingdom, 32-41 West Street serves as a home to 580+ employees working in over 130,000 sq. ft. of office space. In 2018, Morey Smith Architects were hired to redesign the headquarters building, including an office expansion, as well as a new café and staff gym. Revolving door solution The building entry and atrium were to also undergo an upgrade, with architects designing with aesthetics and high-quality functionality in mind. First, the entrance to the building was outfitted with a unique revolving door solution. Architects combined features of two revolving door models to create the ultimate entrance Architects combined features of two revolving door models to create the ultimate entrance. They mixed the all-glass look of the Crystal TQ with the minimal metal framing of the TQA to create an automatic entrance that would add to the prestige of the building while also saving on energy and creating a comfortable environment inside. The revolving door was also connected to the building’s access control system so that it could be locked afterhours and still allow access to employees with an authorized credential. Tall glass barriers For security into the atrium, architects didn’t want to impose on the open, airy feeling of the building’s large atrium. As a result, Morey Smith installed an array of Speedlane Swing optical turnstiles with tall glass barriers to deter and detect tailgating into the office space. The turnstiles were placed near a reception desk so that staff are able to respond to alarms, as well as grant access to authorized visitors through the use of a BoonTouch remote control panel. James Cox, Area Sales Manager for Boon Edam UK mentions, “Boon Edam optical turnstiles are always a popular choice for corporate offices, not only for security reasons but because they’re aesthetically nice to look at which is ideal for an open environment building.”
IBM and Daimler announced that they have expanded their agreement and Daimler will implement an intelligent cloud solution and migrate its global after-sales portal to the IBM public cloud. This will allow Daimler to drive innovation, while also benefiting from one of the industry's most open and secure public clouds for business. The global after-sales portal is key for Daimler's market activities, supporting workshop processes in the retail sector. In order to meet the growing demands of the portal core products, the company was looking for a new technical platform to improve agility and scalability, while maintaining a high level of security. Protection of sensitive data The platform, based on the IBM Cloud Kubernetes Service, is designed to allow the client to transform the application into a modern and scalable microservices architecture. Hosting its portal on IBM public cloud will help Daimler scale as needed and quickly introduce new offerings to help meet the needs of its users. At the same time, the data will be transferred and stored in the IBM public cloud, which is protected by comprehensive security capabilities, such as IBM Hyper Protect Services, accommodating Daimler's highest requirements for the protection of sensitive data. Encryption "As organizations redefine their operations by adopting public cloud, they're able to drive innovation and modernize their infrastructures, while still prioritizing security," said Howard Boville, Senior Vice President, IBM Cloud. "IBM public cloud provides industry-leading encryption capabilities that give our clients exclusive control of their keys and data, delivering our highest level of protection for our clients' sensitive data; a key requirement for business across all highly regulated industries." Leveraging IBM public cloud will offer a significant number of advantages; it is designed to be highly scalable, and therefore the efficient administration of the services can help to lower subsequent costs. Furthermore, critical services in the IBM Cloud's multi-zone regions achieve 99.99% platform availability, thus providing reliable operation.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?