OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR And REDSCAN Series Sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forwar...
Senstar, a global provider of perimeter intrusion detection systems (PIDS) and video management systems (VMS), is pleased to introduce Kristen Cory as its new Vice President, Sales, North America. Effective January 1, Mrs. Cory has assumed direct responsibility for Senstar’s North American sales organization. “I am excited to join Senstar and I am looking forward to working with the US and Canadian teams to grow the Senstar brand,” said Mrs. Cory. “Senstar’s market...
DW, the provider of digital recorders, surveillance cameras and related management software, announces the upcoming release of our 4MP MEGApix video analytics cameras. The new cameras — including fixed and varifocal lens turrets (DWC-MTT4WiA, DWC-MTT4Wi28, DWC-MTT4Wi36 and DWC-MTT4Wi6), vandal domes with fixed varifocal lens (DWC-MVT4WiA, DWC-MVT4Wi28, DWC-MVT4Wi36 and DWC-MVT4Wi6), and fixed lens bullet (DWC-MBT4Wi28 and DWC-MBT4Wi36) — offer a vast array of analytical solutions. A...
The Middle East is proving to be a hot bed of business for global suppliers of security, safety, and fire protection, with the world’s top industry players all set to converge at Intersec 2019 in Dubai to drive more double digit growth. From video surveillance technologies with Artificial Intelligence and deep learning capabilities, to cloud-based access control solutions and flame retardant protective clothing, Intersec 2019 will shine the spotlight on game changing solutions solving cha...
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...
Senstar, global perimeter intrusion detection and video management solutions provider, is pleased to announce its Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system has received the Fixture Seal of Approval (FSA) from the International Dark Skies Association (IDA). IDA is the recognized authority on light pollution. Its mission is to preserve and protect the nighttime environment and the heritage of dark skies through environmentally responsible outdoor lighting....
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's prisons, particularly as a means of smuggling. SPYNEL 360° Thermal Imaging Sensors To protect prisons, borders and critical infrastructures from smuggling and terrorism, Electro Optical Industries upgraded their most powerful 360° thermal imaging sensors SPYNEL-X and SPYNEL-S, integrating a visible channel and a laser rangefinder to the thermal cameras. The new V-LRF option aims to facilitate the tracking and the identification of a detected threat, thanks to the full HD visible cameras’ optical zoom (x30). The exact distance of the threat is provided by the laser rangefinder in real time, an option particularly adapted to the detection, tracking and recognition of the smallest targets, like UAVs. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification An innovation it is, as all other systems on the market must use separate sensors to get similar functions: one sensor for detection, a radar for instance, and another sensor for identification, such as a PanTiltZoom (PTZ) camera. Xavier Elbaz, Sales Manager at Electro Optical Industries explains: "With separate systems, it is hardly possible to ensure a real 360° coverage for detection and identification because of blind sectors created by the mechanical supports. Moreover, separate sensors must be integrated and calibrated to properly operate together. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification." SPYNEL V-LRF With CYCLOPE Detection Software In addition, most of the time, UAVs' small size and low electromagnetic signature go unregistered by traditional detection measures. With SPYNEL's thermal imaging technology, it is impossible for a drone to go unnoticed: any object, hot or cold will be detected by the 360° thermal sensor, day and night. SPYNEL V-LRF and its automatic detection & tracking software CYCLOPE are easy to deploy and to use, and the system is easily interfaceable for multi-sensor protection of critical infrastructure like prisons. Data is smoothly merged with other sensors’ data like radars, AIS, fence vibration sensors, etc., and displayed on the same interface, whereas separate sensors must be integrated and calibrated to operate properly together.
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, Unified Interface Platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorized as an Awareness and Response Coordination System. “Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.” Security And Business Intelligence Software Maxxess Insite is a single system that harnesses the power of myriad system technologies Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customized solution and unparalleled efficiency. Myriad System Technologies Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration. Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
Schools are continuing to upgrade security measures for pupil safety. However, on top of all the fundamental challenges schools face, implementing well-rounded and effective security solutions can seem a great difficulty. Andrew Shaw, architectural consultant for Allegion UK, discusses the advantages of electro-mechanical solutions. Schools can equate to some of the most complex security challenges for architects, specifiers and school officials alike. This is because choosing the right solution requires a comprehensive analysis of a building’s design and layout and the different requirements of each perimeter, alongside specific uses, user groups and opening hours. Different areas and spaces, such as reception areas, entry points or classrooms, each need to be approached differently in terms of safety and security measures. Precautionary Lockdown Strategy Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency What’s more, if the building is used for out-of-hours purposes, or if contractors are on-site, these issues will also need to be addressed. Simply put, there’s no one-size-fits-all solution for schools. Security hardware and a precautionary lockdown strategy are necessities, as they are integral to the safety of teachers, students and visitors. Adequate measures need to be implemented so that schools are prepared for, and safeguarded against, external threats or unauthorized access. While a lot of the responsibility falls on the shoulders of facility managers, it’s also important for teachers and administrators to be aware of, and educated on, solutions and training. This means knowing how certain hardware works and how to spot a faulty product. Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency. Unique Building Requirements This is becoming increasingly important with newer systems too, especially as the Internet of Things (IoT) becomes more commonplace within the industry. Integrating electro-mechanical solutions into existing school security systems is now more commonly viewed as an achievable and viable option. Because an off-the-shelf security solution to fit all doesn’t exist, the benefits of integrating both electronic and mechanical solutions into systems are quickly becoming realized. As such, schools are growing more accustomed to tailored solutions based on their own unique building requirements and budgets. Each school layout is unique and, therefore, must address a range of security factors specific to different areas. Many areas within a school’s building design must accommodate for high capacity, especially in places that may be part of a fire escape route. Mechanical Door Hardware Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds All schools need to address three different levels of security. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. Finally, the third level - and the most vulnerable - refers to the core of the school that both pupils and staff occupy. The first level of security is the perimeter, and these areas become more important depending on the time of day. Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds. Incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. Greater Visitor Management An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. This option also allows integration with central security systems, which can be automatically activated and pre-programmed for regular scheduled control. These solutions help lower the risk of potential unauthorized entry, which can lead to theft of equipment, and compromising people’s safety. They also aid facility and site managers in knowing where potential weak points are in the school perimeter. Because schools will most likely have multiple access points, the combination of mechanical hardware and access control systems allows for both security and convenience, providing greater control and monitoring. Efficient Access Control A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building The second level of security is the administration or reception area. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. This area should be able to restrict visitors from freely accessing the rest of the school. A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. When using access control solutions, schools are provided with information on who entered a part of the premises and when, are able to restrict or limit access to specific times of the day, and easily add and delete users, allowing them to manage access to the building more efficiently. Integrated Centralized Systems The areas most susceptible to vulnerability are the internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. For these areas, there are a number of different solutions that will be beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Mechanical solutions, which include a cylinder lock and key, are also ideal for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. When paired with electronic access control systems, mechanical hardware can provide simplified yet improved security levels. Electromagnetic Door Closers Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit In schools, it is often the case that entrance doors will also be fire exits. Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit. When integrated with electronic access control systems, emergency exit points become safer and more secure as access control measures can be added, whether for teachers, pupils or visitors. In the interest of fire safety, and to eliminate the illegal practice of propping fire doors open as well as aid free passage in busy areas, electromagnetic door closers can be linked with the building’s fire alarm system. When the fire alarm sounds (or in the event of a power outage), the electromagnet deactivates, bringing the door to a close in a normal manner, preventing the spread of fire and smoke. Building Design Requirements By design, electronic access control systems are also easy to use and maintain. The reliability and durability of such systems also means that there will be less need for excess time and money spent on maintenance, and there’s peace of mind in knowing the systems are code-compliant. Their flexibility additionally allows for the implementation of a highly-effective bespoke solution. Electronic access control and electronic devices are able to be integrated with or into a variety of other electronic and mechanical systems. This means schools are able to successfully tailor solutions to their own budgets and building design requirements. Fully integrated security solutions and biometrics are becoming increasingly affordable and accessible, giving school officials and managing teams greater control over their buildings. These solutions also give them scalability for the future, meaning systems are both future-proof and easily upgradable.
Boon Edam Inc., global manufacturer of security entrances and architectural revolving doors, has announced the launch of an updated Turnlock full height turnstile that offers increased performance and an improved experience for users and installers alike. The update focuses on the design of the speed control mechanism and the overall construction of the turnstile’s top channel, providing improved rotation action and a significant reduction in overall weight of the top channel. In addition, the optional, emergency backup battery lasts twice as long as before. Secure, Authorized Access In Harsh, Outdoor Environments Boon Edam’s Turnlock full height turnstiles are used around the world to allow only authorized personnel access into secure environments. Typically installed outdoors, their durable construction and efficient operation provide security access even in harsh weather conditions. They serve as visual deterrents against intrusion at perimeter fence lines of corporate headquarters, critical infrastructure locations, distribution centers, amusement parks and more. Speed Control Mechanism Ensures Safe Passage The speed control mechanism in a full height turnstile ensures a safe rotation speed during use by absorbing excessive force The speed control mechanism in a full height turnstile ensures a safe rotation speed during use by dampening or absorbing excessive force when the rotors are pushed. The new and improved mechanism fulfills this purpose by providing a smooth rotation experience while also minimizing the force needed for a user to push the rotor. The rotor also slows down gently as it completes rotation, stopping in place to await the next user. The operation is quiet, smooth and subtle, without vibration, creating an optimal user experience. Easy Installation And Doubled Battery Backup The updated Turnlock now features a narrower top channel that weighs 70 lbs. lighter than the previous version, making installation much easier for contractors. The top channel is now only 8 inches wide, compared to the 18-inch diameter used previously. Finally, the optional battery backup has been completely redesigned and updated using the latest technologies. The battery backup keeps a turnstile working in case the power goes out and the coverage period has now doubled from two hours to four hours of protection. The size and weight of the battery system has also been cut in half, contributing to ease of installation. Redesigned Top Channel And Speed Control Feature The updated features are available on all 3-rotor, single and tandem Turnlock 100, 150 and 200 models The updated features are available on all 3-rotor, single and tandem Turnlock 100, 150 and 200 models. Also, the redesigned top channel and speed control can be easily retrofitted into existing, installed Turnlock turnstiles. “We are always taking steps to improve our products, even a workhorse like the Turnlock, demonstrating our objective of ‘Basic Done Well’,” said Tom Schneider, Engineering Manager at Boon Edam Inc. He further added, “The quiet action and smooth rotation work well indoors or outdoors and contractors will definitely notice a significantly lighter top channel that is much easier to lift and install in the field. We think our customers will appreciate these performance upgrades and we’ll continue to listen to their feedback.” All Boon Edam full height turnstile models have been tested and certified to conform to UL Standard 294, a prevalent industry standard for ensuring the safe operation of turnstile equipment in the United States.
Sielox LLC is showcasing the company’s latest Advanced Access Control and Emergency Notification and Response solutions here at GSX 2018 in booth #3914. Products on display included in the Sielox layered system approach include: CLASS (Crisis Lockdown Alert Status System) Emergency Notification and Lockdown Solution; Pinnacle Advanced Access Control Solution; AnyWare Browser-Based Access Control Platform; and the company’s highly touted 1700 Intelligent Controller. Sielox is also demonstrating extended mobile capabilities through the integration of the Conekt Mobile Credential Solution from Farpointe with the AnyWare and Pinnacle software platforms; and securing perimeter and interior doors solution with cost-effective wireless locks from Allegion. Sielox Pinnacle Access Control Platform Pinnacle is available in several configurations that can be specifically tailored to the needs of any size business or facility, or integrated in a layered systems model “Our layered approach takes into account the complexity of securing different types of facilities and organizations,” said Karen Evans, CEO and President, Sielox. “There is no one solution that can fully cover every location, incident or environment.” The Sielox Pinnacle Access Control Platform offers numerous advanced capabilities to provide users with greater control over their facilities' security with maximum flexibility to address current needs and the scalability to address future requirements. Pinnacle is available in several configurations that can be specifically tailored to the needs of any size business or facility, or integrated in a layered systems model. Recent enhancements to Pinnacle include a GUI, Microsoft support, two-man rule, privilege access levels and reports, data sharing and convenient new programming features. Notifying Responders In Real Time The Sielox CLASS (Crisis Lockdown Alert Status System) Emergency Notification and Response Solution provides vital emergency status details to responders so they can best manage events. Administrators or any designated initiator can issue an emergency alert to notify responders of conditions in real time while communicating status via one of five programmable color-coded alert levels. Occupants within the facility can then report status at their specific location enabling responders to view detailed facility maps with compiled room-by-room color-coded conditions that update in real time as the situation evolves. A chat feature enables two-way communications between occupants and first responders to exchange detailed information or instructions. CLASS can also issue messages with response instructions specific to each alert level via email or text, and override any PC on the network to ensure the highest visibility of alert status. Strengthening Network Security With SSL Certificates SSL certificates have been added to bolster network security, which allow specific users to enter as a Supervisor for upgrades and troubleshooting The Sielox innovative AnyWare Browser-Based Access Control Platform features a variety of enhancements that make it faster, easier and more scalable for small to mid-sized businesses to take access management mobile. The intuitive and easy-to-use AnyWare solution features a capacity from 8 up to 40 doors, allows for an increased number of controllers and readers, custom fields so users can add additional information to the software, the ability to add card holder images to the data record, and block a reader so only first responders have access. In addition to multiple card types being added, SSL certificates have been added to bolster network security, which allow specific users to enter as a Supervisor for upgrades and troubleshooting. Intelligent Fully-Distributed Controller The Sielox 1700 Intelligent Controller ‘no end of life’ design utilizes 32-bit technology with real-time operations to deliver exceptional speed, performance and reliability. For uncompromised security, the 1700 is an intelligent fully-distributed controller ensuring decisions even if communications have been interrupted. It also Incorporates a true IP solution with data transfer rates up to 100 mbps to the onboard processor. The 1700 features a removable secure digital (SD) card, with storage capacity ranging from 128 MB to 1 GB. The SD card can house a redundant controller configuration, cardholder database, events, maintenance log, wiring diagram, installation manual and more. Support for industry standard reader types and technologies include: FIPS 201(PIV), CAC, Wiegand, card and pin, proximity, biometric, smart card, magnetic stripe and barcode. No personal data is required or collected from the user or integrator, and multiple credentials can be stored on the app Conekt Mobile Credentials And Readers Integrated with Sielox’s 1700 Controller and the AnyWare and Pinnacle software platforms, Conekt Mobile Credentials and Readers from Farpointe Data use Bluetooth to enable communication between smartphones and readers. No personal data is required or collected from the user or integrator, and multiple credentials can be stored on the app. Sielox is also showcasing a unique and powerful integration with Allegion to increase perimeter security at K-12 schools. Utilising Sielox’s Pinnacle Access Control Platform and 1700 Intelligent Controllers, K-12 schools can seamlessly integrate the Remote Undogging (RU) and Remote Monitoring (RM) options available with Allegion’s Von Duprin and Schlage wireless locks, reducing overall costs for additional network cabling while increasing overall situational awareness and security with comprehensive lockdown capabilities.
Sielox LLC and Allegion have partnered to provide a unique and powerful solution designed to increase perimeter security at K-12 schools. Utilizing the Sielox Pinnacle Access Control Platform and 1700 Intelligent Controllers, K-12 schools can seamlessly integrate the Remote Undogging (RU) and Remote Monitoring (RM) options available with Allegion’s Von Duprin and Schlage wireless locks from a centralized location, reducing overall costs for additional network cabling while increasing overall situational awareness and security with comprehensive lockdown capabilities. “Through our integration with Allegion, we have further enhanced our layered approach for school security and emergency notification by extending the power of our Pinnacle Access Control Platform to provide wireless control and monitoring of entry and egress points at the perimeter,” said Karen Evans, CEO and President, Sielox. Remote Undogging For Centralized Lock Down Allegion’s Von Duprin RU retrofit kit for exit devices is a cost-effective solution for secondary entry/egress points in K-12 schools that enables remote undogging for centralized lock down and door status monitoring with integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signaling capabilities. The RU connects via BLE to the ENGAGE Gateway, providing real-time, bi-directional communication to the Sielox Pinnacle Access Control Platform and 1700 Intelligent Controllers.RU is a modular battery-powered kit that can be added on to existing 98/99 and 33A/35A series devices RU is a modular battery-powered kit that can be added on to existing 98/99 and 33A/35A series devices. The Allegion Von Duprin RM retrofit kit is the sensor-only configuration for exit-only or fire-rated doors that require monitoring. It provides visibility to door status with the same RX, LX and DPS signals as the RU, without the centralized lockdown component. Intelligent Fully-Distributed Controller Sielox Pinnacle Access Control Platform offers numerous advanced capabilities to provide users with greater control over their facilities' security with maximum flexibility to address current needs and the scalability to address future requirements. Pinnacle is available in several configurations that can be specifically tailored to the needs of any size business or facility, or integrated in a layered systems model. Sielox’s 1700 Intelligent Controller ‘no end of life’ design utilizes 32-bit technology with real-time operations to deliver exceptional speed, performance and reliability. For uncompromised security, the 1700 is an intelligent fully-distributed controller ensuring decisions even if communications have been interrupted. Support for industry standard reader types and technologies include: FIPS 201(PIV), CAC, Wiegand, card and pin, proximity, biometric, smart card, magnetic stripe and barcode. Sielox is featuring the integration at GSX 2018 in booth #3914. Additionally, the Von Duprin RU and RM options will be included Allegion’s GSX 2018 booth (#3715).
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable Entry Management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorized individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorized access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable Hardware Components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorized employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing Security Needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorizations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorizations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion Alarm Systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customized Intrusion Systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customize the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video Management System A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full Alarm And Event Management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analyzing video content over large distances Intelligent Video Analytics have the unique capability of analyzing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical Security Solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organizers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented Security Measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organizers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organizers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current Screening Methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, surveillance cameras, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security Method Limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding Security Reach With FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognizing Moving Magnetic Signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organized into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective Mass Screening Solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that RagingWire Data Centers has installed Boon Edam’s Tourlock 180+90 security revolving doors as part of its integrated access systems that protect their data centers in Ashburn, Va. and Sacramento, Calif. Founded in 2000, RagingWire was one of the first companies that helped to build the multi-billion dollar global data center colocation industry. Now, RagingWire is the North American data center platform within the portfolio of NTT Communications, which operates 140 data centers in 20 countries worldwide, making RagingWire one of the largest and most financially solid data center companies in the world. Demanding Hyperscale Cloud RagingWire is recognized as an industry leader in data center security and overall customer experience"RagingWire uses Tourlock security revolving doors at its Ashburn VA3 Data Center, which features 245,000 square feet of space and 16 megawatts of critical power, and its Sacramento CA3 Data Center, which is a 180,000 square foot facility with 14 megawatts of critical power. VA3 and CA3 are part of RagingWire’s portfolio of data centers in Ashburn, Northern California and Dallas, Texas. “As the colocation data center of choice for some of the most demanding hyperscale cloud and enterprise companies, RagingWire is recognized as an industry leader in data center security and overall customer experience,” said Mark Borto, CEO of Boon Edam Inc. “We are proud to provide an important part of RagingWire’s sophisticated, multi-layer, integrated security system.” Provide Efficient Passage Boon Edam’s security revolving doors provide efficient passage for hundreds of people daily at RagingWire’s data centers. The doors prevent piggybacking and tailgating during both entry and exit by using a combination of sensors to recognize shapes, size and volume in three dimensions, and then stopping the door when a violation occurs. Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate" The state-of-the-art system also generates an accurate picture of exactly who is in the building at all times. “Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate,” said Eddie Ankers, Director of Corporate Security at RagingWire. Analyze Suspicious Behavior “By adding these doors to our defense-in-depth security strategy, we are providing the best possible protection system for our customers’ mission critical equipment.” In addition to Boon Edam’s Tourlock security revolving doors, RagingWire’s layered security approach features highly trained, 24x7 security staff, biometric scanners, badge readers, intelligent high-definition video cameras that analyze suspicious behavior, anti-tailgate mantraps, a building-within-a-building design, anti-climb perimeter fencing, concrete bollards in front of building entryways, and an anti-ram security gate.
CaleyLock Edinburgh was established in 1973 and is one of the longest established locksmiths in Edinburgh – the current owners took it over in 2011 and moved into their brand-new purpose-built premises in December 2017. CaleyLock installs and commissions as well as builds cylinders and padlocks in-house and their main customers belong to utilities, commercial, high-end residential, banking, local authorities and leisure sectors. When preparing to move to their new premises, they needed a security solution which would not only secure their premises, but also enable them to create a Showroom for customers – this is where CLIQ from Abloy came in. CaleyLock worked together with Abloy UK to install CLIQ throughout their premises to secure a number of external and internal doors. A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for employees CLIQ Monitoring & Access Solutions A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for people including employees, and monitor the access to restricted areas. The owners also now have peace of mind that nobody can access unauthorized areas outside of work hours and lost or stolen keys can easily be deleted from the system. CaleyLock are also delighted to now have a CLIQ Showroom to be able to demonstrate PROTEC2 CLIQ from Abloy to customers and end-users in a real-life working environment, which has proven to be efficient in displaying the benefits that CLIQ can bring to any organization, big or small. Ross McKay, Director of CaleyLock Edinburgh said of the installation “We find CLIQ is working really well for us, as our new premises are purpose built – there were no locks installed initially so this has been a great upgrade to the security. As part of the system, we also have a low energy Bluetooth key which is ideal for people working in remote areas as we can see from the audit trail who has accessed specific sites, and when.”
Covering hundreds of acres, Dunsfold Park near Guildford began life as a military airfield in 1942, before making its mark in aviation history for multiple innovations as part of BAe Systems until 1960. Later, the estate was acquired by the award-winning Rutland Group, who continue to manage the site, now in partnership with owners, Trinity College Cambridge. Today, in addition to its private airfield and motor test track, the estate has a thriving business park where over 100 companies employ 700 people. As a popular film location, it is home to the BBC’s Top Gear team and the backdrop to TV and Hollywood blockbusters from Casino Royale to Come Fly With Me. The continued rejuvenation of Dunsfold Park includes investment in sustainable new infrastructure, with plans to further develop the estate amenities and community. And every year, thousands of people celebrate the site’s illustrious history at its air and motoring show, Wings & Wheels. IDIS HD IP Video Solution To support the continued development of the high-profile, multi-use estate, the management team wanted to replace the legacy security system with an HD IP infrastructure to increase capacity, image quality and flexibility to scale. Although the estate is secured by a physical perimeter fence, 24/7 surveillance is a pre-requisite to ensure robust protection for the growing number of people working on site, the businesses and many high-value assets. With so many diverse uses – from landing jumbo jets and testing high-performance cars to housing high-tech businesses and hosting public events – upholding health, safety and security in all eventualities is vitally important. The customised design was built with state-of-the-art IDIS equipment to deliver seamless plug-and-play ease of useThe solution had to be easy to use and operate, extremely resilient and offer good value. A key objective was to improve 24/7 visibility of hard-to-reach locations in all weather conditions, like remote entrance gates, with the flexibility for operators to easily zone in on specific areas as required. Integrated Fiber Optic-Wireless IP HD Surveillance Following a successful pilot trial, the contract was awarded to expert security integrators ISD-Tech to deliver a comprehensive HD surveillance solution running on an integrated fiber optic and wireless IP network. The customized design was built with state-of-the-art IDIS equipment to deliver seamless plug-and-play ease of use, high-quality real-time images with no visible latency and industry-leading resilience, all from a single provider. Comprising hardware, software and peripherals from the IDIS DirectIP suite, the solution includes a mix of seamlessly integrated ruggedized infra-red PTZ from Redvision as well as static cameras, HD network video recorders (NVRs) and cost-free IDIS Center video management software. The versatile IDIS equipment ensured that challenges in the site environment could be easily overcome to provide complete 24/7 coverage, including long-range night-time visibility of previously hard-to-reach areas. The innovative solution is optimized to meet Dunsfold Park’s current surveillance requirements while providing the foundations to scale across the wider Dunsfold Park portfolio and add new technologies, such as ANPR, as its needs evolve.
Officially inaugurated in October 2017, Ion Oblemenco Stadium in the Romanian city of Craiova is the country’s most modern football arena at a capacity of over 30,000 seats. The futuristic stadium, inspired by the art of Romanian sculptor Constantin Brâncuși, was built from the ground up over the course of two-and-a-half years at a total cost of EUR 51 million. It is home to football club CS Universitatea Craiova and was ranked fourth on the Stadium DB website list for Stadium of the Year 2017. The high-profile project was built with a clear goal: Hosting international and premium league matches not only in the Romanian capital of Bucharest, but also in the city on the river Jiu. For this reason, the municipality of Craiova required a stadium security solution on par with stringent guidelines – according to the year 2020 European football championship standards – to guarantee safety during mass events. Working closely with the on-site team, Bosch experts installed a fire and safety solution composed of four fire panels and 1,500 detectors Fire And Safety Solution Looking for a trusted vendor with sports stadium experience, plus the ability to deliver the majority of necessary equipment as a single point of contact, Craiova officials opted for Bosch. Working closely with the on-site team, Bosch experts installed a fire and safety solution composed of four fire panels and 1,500 detectors. The stadium also received a quality sound system with Electro Voice Pro Sound speakers for music and commentary, Dynacord Promatrix for evacuation, Bosch loudspeakers for interior sound, as well as a conference and interpretation system for the pressroom. However, the real “kicker” of the football stadium installation is the comprehensive video security solution: Ion Oblemenco Stadium boasts a fully integrated Bosch video security system including 211 cameras, centrally managed on a single platform through an enterprise edition of the Bosch Video Management System (BVMS). Smart Video Surveillance System The networked cameras serve a wide range of functions at entry and exit points and areas surrounding the stadium: On the perimeter, 115 robust DINION IP bullet 5000 cameras watch central avenues leading to the stadium, while 86 discrete FLEXIDOME IP 5000 cameras monitor visitors. For added security, eight AUTODOME IP 7000 cameras – two on the stadium outside, six inside – safeguard the surroundings with on-board Intelligent Video Analytics. Intelligent Video Analytics (IVA) allows for “smart” video surveillance functions. For instance, Intelligent Tracking automatically tracks moving objects based on predefined alarm rules. Besides automatic tracking of objects of interest once certain predefine rules, like loitering, security operators in Craiova can also manually track groups of football fans or follow specific individuals. The recording units support forensic search enabling security operators to quickly retrieve the relevant video data from hours of stored videoVideo streams of all 211 cameras are monitored in a central security room, manned by operator personnel and members of Romania’s police during matches. Video data is safely stored on two Bosch DIVAR IP 7000 network video recording units with a total of 256 Terabyte storage capacity. The recorders feature Video Recording Manager (VRM) software to increase reliability and reduce storage volumes and costs, by automatically balancing the video stream load to the free available storage devices. Also, the recording units support forensic search enabling security operators to quickly retrieve the relevant video data from hours of stored video to deliver irrefutable evidence. Easy-To-Use Security Solutions Craiova officials are satisfied with the easy-to-use and cost-efficient solution. Because Bosch products fulfilled international guidelines, the stadium is now fully certified to host matches of the First Romanian Football League, European league matches, Champions League and national team matches. As the first stadium in Romania constructed in line with guidelines for the 2020 European football championship series, Ion Oblemenco Stadium serves as a model for future stadium projects planned to be built for the 2020 tournament and beyond.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, and Dwelo LLC, a provider of smart-home solutions purpose-built for apartment owners, managers and residents, has announced a partnership that is seamlessly integrating PDK’s cloud access control technology into the Dwelo smart apartment platform. Dwelo’s web and mobile software, which currently offers apartment dwellers the ability to control smart devices such as light switches, thermostats and door deadbolts for their individual units, has added features to manage access to common areas of their building or community, such as entry gates, clubhouse, gym and laundry facilities. These spaces can now be secured by PDK’s cloud access control solution, pdk.io, providing apartment property managers and owners with valuable operational efficiencies. The administrative software interface, not visible to residents, enables management to easily establish and enforce authorized hours of use for common facilities. An audit trail reports all traffic into the property, including any one-time credentials issued by residents, which can be used to assist in investigations in cases of theft or vandalism. When residents move out, their access to unit, common, and perimeter access is immediately deactivated, eliminating the risks that accompany traditional keys that would otherwise remain in circulation. The system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue Scalable And Affordable Security Solutions Beyond operational efficiencies, residents can unlock perimeter and common doors or gates using the same mobile app they use to control their apartments. In addition, they have the ability to use their phones or computers to generate temporary, one-time credentials that allow visitors, delivery and service people to gain access as needed. These features add to the conveniences afforded to residents living in Dwelo-enabled smart apartments. Both Dwelo and PDK have built successful businesses by leveraging the power of cloud technology to create scalable, affordable solutions that offer unprecedented ease of installation for contractors and simple usability for customers. With their combined areas of expertise in home automation and security, together they see an opportunity to serve a large and generally neglected market sector – apartment renters who desire the same smart home technological conveniences as today’s home owners and seek out communities that offer those smart home solutions. The Dwelo/PDK solution is available for both new construction and retrofits. After an initial per-unit installation charge, the system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue. Enhanced Apartment Living “Dwelo is thrilled to be partnering with such an innovative company as PDK. PDK is a technology leader in the electronic access control space, and Dwelo and its customers are already benefitting from their forward-thinking approach to access." Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector" "The consolidation of smart home control and perimeter and common area access control, in one platform, is a powerful marriage for multifamily property owners. We look forward, with PDK, to crafting more solutions that address the specific needs of these customers,” says Mike Rovito, CEO of Dwelo, LLC. “PDKs solution has been embraced by customers in the commercial sector for its simple ease of use and platform flexibility. Our wireless and PoE options allow for cost-effective takeover of legacy equipment, while supporting new construction projects with all the benefits derived from leveraging the network." "Our mantra, simplicity without compromise, dovetails perfectly with Dwelo’s corporate mission to enhance apartment living through easily accessible IoT technology. Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector,” says Evan Tree, CEO of ProdataKey.
Sports fans and festival goers will enjoy greater peace of mind from vehicle as a weapon (VAAW) attacks with the arrival of a new lightweight rapid-deploy vehicle security barrier (VSB). The Rapid Defender temporary VSB was deployed in minutes to protect spectators and competitors from VAAW threat at the London Marathon and at football stadia and events the length and breadth of the country. Rosehill Security, a manufacturer of perimeter security solutions, has created the innovative hostile vehicle mitigation (HVM) barrier, made up of robust units of recycled rubber weighing just 49kg each. More than 150 people have died in 18 months of VAAW in cities from London to Manhattan and Melbourne – and just last week, Toronto Fast Deployment StadiumTM – a specialist event services supplier of traffic management, stewarding, security and training services to the events industry that protects crowds at Premier League and EFL clubs, festivals and city-wide events – is extolling its benefits. Founder, owner and MD David McAtamney says: “We want to change the face of crowd safety through HVM barriers. The Rapid Defender makes this a reality because of its speed of deployment – our teams installed 13m of the barrier in just five minutes at the London Marathon!” More than 150 people have died in 18 months of VAAW in cities from London to Manhattan and Melbourne – and just last week, Toronto. Rosehill Security has designed the Rapid Defender specifically to provide protection for crowds of people from such attacks. Integration For Enhanced Security Sales manager Dalton Marshall says: “It is surface-mounted with no foundations and weighs less than a third of comparable concrete barriers, so can be deployed in minutes almost anywhere, from the streets surrounding stadia to uneven festival sites.” The Perimeter Security Suppliers Association has launched a new online source of help and information on HVM – the HVMHubThe 333mm-wide units are connected by 20mm diameter steel cables or rods, creating an HVM barrier of any length. Four men can manually install a barrier across the width of a road in less than five minutes with no special tools or lifting equipment. It can then be removed and reused. The Rapid Defender can be anchored or integrated with other temporary or permanent HVM systems to create a stronger physical barrier as part of a holistic HVM solution. The Perimeter Security Suppliers Association (PSSA), to which Rosehill Security belongs, has just launched a new online source of help and information on HVM – the HVMHub – in conjunction with the Home Office’s Joint Security and Resilience Centre.