The six free CEU courses that the Electronic Security Association (ESA) offered for free through the month of March 2020 will remain available free of charge through April 2020, ESA has announced. The Electronic Security Association took the price tag off these online CEU courses to support electronic security and life safety companies during the on-going coronavirus (COVID19) outbreak. ESA’s free CEU online courses As the situation has progressed and guidelines for social distancing hav...
Pulse Secure, a renowned provider of Zero Trust Secure Access solutions, announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top ten NAC vendors by global revenue market share and one of six leading vendors to show market share gain. Frost and Sullivan market report identifies Pulse Secure among top 10 Network Access Control (NAC) vendors by global revenue market share. The 2020 Frost & Sullivan Network Access Control (NAC) Market, Forecast to 2024 report stat...
Coronavirus (Covid19) pandemic has hit the world unprepared for its consequences on the healthcare system and economic life. As a result, the number one priority for countries and states is to flatten the infection curve and provide them with time. Essential policies adopted to achieve this are directed at changing and controlling human daily behavior. AI-Based solutions viisights has Artificial Intelligence-based solutions to help authorities enforce those policies, help prevent the virus spr...
Pulse Secure, the provider of software-defined secure access solutions, announces a new distribution partnership with Inforte to grow and better support its channel community across Turkey, and to meet accelerating demand for Zero Trust access security. Inforte is a value-added distributor specializing in the new generation of information security solutions. Inforte provides innovative services to support its community of over 100+ partners with pre-sales and post-sales services, logistics, mar...
Digital Monitoring Products, Inc. (DMP) has announced that its XR Series control panels have added an intelligent new layer of security and awareness, giving users the ability to selectively monitor their properties and capture video for specific activities. Now, users can choose from a variety of specific camera analytic events they want to be made aware of, either by an email, text message or push notification to their Virtual Keypad app. These events can also be sent to a control station rec...
This year Counter-Terror Expo (CTX) and IFSEC International will co-locate for the first time, creating the UK’s largest security event. The two events will take place simultaneously from 19-21 May 2020 at the ExCeL, London. CTX brings together international specialists and experts from industry, government and policing to share ideas and technology within the counter-terrorism field. The content program will feature themes including drone threats and response, securing major events and p...
ASSA ABLOY publicly launches the RITE Slide, an integrated opening assembly where all individual door components are included to create a complete door system. RITE Slide is engineered for a wide array of applications and industries, specifically where sound control and space are critical to the design, such as medical exam rooms, patient rooms, offices and hotel meeting spaces. “Drawing on years of experience and expertise in building acoustically rated door systems, RITE Slide is an innovative opening solution that enhances privacy, saves space, and is aesthetically designed to meet the needs of a variety of customers and end-users,” said Stacey Callahan, ASSA ABLOY Door Group’s Vice President of Marketing and Innovation. Ensuring privacy and quiet operation RITE Slide’s unique, integrated assembly design includes all of the necessary door components RITE Slide ensures privacy and quiet operation with sound seals, automatic door bottom, and soft-close operation to minimize slamming, and wear and tear on the door and hardware. Offering both acoustically rated and non-acoustic options, the sliding door has a perimeter seal that blocks out light and sound, and operational door hardware for passage or privacy with locking applications. The acoustically rated series has been third-party tested to an STC 34 utilizing a flush wood door as a complete assembly according to ASTM E90. A barn-style sliding door, RITE Slide’s unique, integrated assembly design includes all of the necessary door components including the frame, door, operating hardware, track hardware and accessories. Traditional swing doors RITE Slide’s design also saves space by occupying a fractional footprint compared to traditional swing doors. The aluminum frame and track has a narrow 1-1/2” face frame profile for a sleek aesthetic design. Adding to the modern design, RITE Slide comes in 11 veneer species, 5 door stain colors and 6 cut-out options as standard, with further custom capabilities available. The door also incorporates built-in three axis adjustability for ease of installation and operation.
Everbridge, Inc., the globally renowned company in critical event management (CEM), has announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organizations to protect their people, assets, operations, supply chain and brand from critical events such as coronavirus (COVID-19). Everbridge CEM platform Everbridge’s industry renowned CEM platform will feature a new IoT extension module that will also leverage the intellectual property from recent technology acquisitions of Connexient and CNL Software. As a result, organizations will be able to gather a broader range of situational intelligence and automate targeted responses throughout their entire safety, security, and operational continuum – from across a global footprint to within campuses and facilities. Everbridge CEM platform enables organizations to utilize vast amounts of electronic data, including IoT sensors With the number of IoT devices expected to approach 75 billion by 2025, the Everbridge CEM platform enables organizations to utilize vast amounts of electronic data, including IoT sensors, to digitally transform how they manage the safety and security of their employees, customers, patients, first responders, residents, and visitors, as well as the resiliency of their operations and supply chain. Critical Event Management (CEM) for IoT CEM for IoT extends the number of use cases for the Everbridge platform within the broader critical event management market, complementing the company’s existing offerings for supply chain and wearable devices. Companies, governments and healthcare organizations utilize CEM to mitigate risks from coronavirus with several million COVID-19 related communications deployed by Everbridge in recent weeks. The expansion of CEM for IoT enhances coronavirus-related use cases to better protect people, operations, supply chain and brand. Coordination between first responders, healthcare units For example, the Everbridge ecosystem supports over 1,500 healthcare entities including the top pharmaceutical, biomedical and medical device and manufacturing companies, as well as the largest healthcare systems (overseeing more than 25 percent of all hospital beds in the U.S.), managed care organizations, pharmacies, and statewide health alert networks (HANs), including the Center for Disease Control and Prevention (CDC) and the National Institutes of Health (NIH). CEM for IoT improves the ability to coordinate first responders and other critical healthcare resources such as intensive care unit (ICU) beds, respirators, expert medical staff, etc., based on real-time data on the broader impact of COVID-19. Data security and threat identification The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats Everbridge’s IoT initiative employs the same CEM framework currently being used by global industry firms involved in aircraft manufacturing, financial services, entertainment & media, high tech, healthcare, hospitality, retail, pharmaceuticals, the federal government, and other sectors. The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats; determining the relevance of a threat to an organization’s people, facilities, assets, supply chain and reputation based on their dynamic locations; automatically initiating and orchestrating an enterprise-wide response plan using the organization’s policies and procedures and monitoring execution of that plan; while analyzing cycle times and results to identify bottlenecks and improve future performance. The acquisitions of Connexient and CNL Software augment the IoT capabilities of the Everbridge CEM Platform bringing the total number of out-of-the-box integrations to over 225. Integrations include numerous healthcare systems, indoor positioning, digital wayfinding, building management, access control, intruder detection, video management, and many more. Safe City and Smart Building programs Everbridge solutions secure major events, cities, states, military installations, government buildings, universities, airports, corporate campuses, and healthcare facilities, providing instrumental functionality to Safe City and Smart Building use cases across multiple critical events including coronavirus. The CEM platform monitors threat data streams continuously, alerts stakeholders" “The CEM platform monitors threat data streams continuously, alerts stakeholders when there is a relevant issue, and automatically orchestrates a coordinated response—it is always on,” said Imad Mouline, Chief Technology Officer (CTO) of Everbridge Inc. Connected, IoT devices Everbridge has experience with early implementations of Safe City and Smart Building programs in both the public safety and corporate space. According to IHS Markit, the global Safe City market will reach $35.8 billion in 2024. Brand Essence Market Research forecasts the overall Smart Building market will grow to $59 billion in 2025. The utilization of a network of connected devices, or IoT, will make up a portion of both markets.
From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a security necessity. ELATEC, a global specialist in radio frequency identification (RFID) readers enabling user authentication for these and other access control applications, will introduce its latest new product the TWN4 Palon Compact Panel Reader at the ISC West Conference and Exhibition, to be held March 17-20, 2020 in Las Vegas, Nevada. Physical access control applications The Palon is a powerful, multi-function reader optimized for physical access control applications. Unlike traditional RFID readers, Palon’s unique capabilities include: Flexible architecture and a robust, open API to support custom applications and unique functionality Supports encryption for security applications Quick and easy updating to support emerging market requirements, and done so either remotely or via a contactless configuration card Reads and writes all major transponder technologies globally—60+, including HID Global, LEGIC and NXP, and NFC and BLE mobile device technologies for use with smartphones. Highly customizable panel mount Palon’s compact OEM PCB module is designed for integration into third-party products and devices. And its attractive, highly customizable panel mount is ideal for use in PAC panels, elevators, parking systems, EV chargers, kiosks and more. To see Palon and ELATEC’s suite of offerings, visit ELATEC booth #23006. Visitors can also see Palon in the new product showcase at ISC West.
At ISC West 2020 Arteco is launching Arteco VCA, the video analytics set that involves the digitalization of video footage and the employment of sophisticated algorithms to classify object types and identify behavior in real time, providing alerts and events to its users. Video analytics allows cameras to be used in a wide range of markets providing a great return on investment, with applications such as: perimeter detection, vehicle classification, crowd control, abandoned object and parking management to name just a few. Accurate false alarm minimization Arteco VCA has a whole set of algorithms that make it an incredible solution The Arteco Video Content Analytics solution was designed to be easily set up and immediately employed by companies and users. Following Arteco’s motto ‘Security at First Sight’, security professionals can rely on a more effective detection procedure due to a made-to-measure approach that gives them the chance to apply multiple logical rules to create unique scenario for a single camera view and video streaming. As a consequence, the user can count on an accurate false alarm minimization and a feeling of extreme control over the scene. Arteco VCA has a whole set of algorithms that make it an incredible solution for an extremely wide range of applications. This is the list of the applicable filters, and much more is about to come: Intrusion detection Loitering Counting Object Classification Deep Learning Filter Speed Filter Appear & Disappear Filter Stopping Object Filter Dwell Filter Enter & Exit Filter Direction Wrong direction Tail Gating Abandoned Object Tamper Detection Simplifying the forensic research Arteco VCA allows the classification of static and moving objects on the basis of size and speed. In addition to the distinction between cars and larger vehicles, individuals and moving groups can be distinguished. The detection of moving subjects generates metadata that appears in real time in the video streaming and allows user to simplify the forensic research: Data and time Channel Type and name of the event Bounding box Classification, speed and size of the object Classification and reliability of Deep Learning Object color Providing specific and powerful algorithms Arteco’s mission is making the companies’ life easy when it comes to security" “Arteco’s mission is making the companies’ life easy when it comes to security. We developed Arteco VCA to be applicable to a wide range of markets, since it provides specific and powerful algorithms that make the security job the most accurate possible.” Said Giampaolo Sabbatani, CEO of Arteco. “And that is not all: we keep on working for interoperability, focusing on integrations, because we know the importance of approaching the customers with customized offers that meet their specific needs of security”. There are several methods to design a security system using Arteco. In the past they had to have a server on each site that linked back to the control room or client PC’s. With the drive of Asian manufactures to reduce the price of surveillance equipment, the company found that clients, convinced by such offering, had to find out that they do not have the full flexibility of being hardware agnostic. Unlimited freedom and flexibility As a consequence, they have been requesting that Arteco developed a solution to integrate with the existing equipment. The company is pleased to say that they have such solution! Now a client can use the lower cost hardware, but still have the ability to use a solution such as Arteco NEXT which now gives them almost unlimited freedom and flexibility. The events can be generated either by the NVR/DVR itself or may be generated on the edge by the camera itself This is the most common scenario: The HikVision and/or Dahua DVR/NVR can be deployed on the remote site and communicate with a local and/or remote control-room. The events can be generated either by the NVR/DVR itself or may be generated on the edge by the camera itself. The control room may be on the local LAN or situated remotely. Events and/or live video will be received in the control room by the operators. Normal IP camera channels Employing the RTSP steam, two paths can be taken: In the state of good internet connection speed, Arteco Next interface can centralize and receive 24/7 video and provide a redundant storage as if the video stream was provided by normal IP camera In state of low internet connection speed, Arteco Next interface can centralize and receive only events in the form of a snapshot from NVR/DVR devices on the field, and finally access to recorded video on the NVR/DVR.
Vacant property protection provider Orbis Protect has joined forces with Estonian company Defendec Services OU to provide its growing number of customers with state-of-the-art security technology. The new partnership announced will enable Orbis Protect to provide clients with military-grade security equipment in a move which also means the Uxbridge-based company will be able offer the very latest video verification technology. Light in the security industry The partnership was confirmed after Orbis Protect Chief Technology Officer Shaun Wilcock headed to Defendec’s headquarters in the Estonian capital Tallinn for in-depth discussions on the company’s new products. Verifeyed+ product series, a sophisticated alarm system with video verification employs Artificial Intelligence (AI) Orbis Protect’s Chief Technology Officer Shaun Wilcock said: “Orbis Protect is proud of its position as a leading light in the security industry. We are a national business with turnover approaching £40m and employing more than 400 staff, which provides security services for the commercial and public sector and some of the biggest names in business. “Our expertise, experience and ability to think differently are an asset to our clients and a central pillar of our growth ambitions. We know our new partnership with Defendec will provide us with a vital edge and enable the company to go from strength to strength. We strive to innovate and lead the industry and that’s why the relationship with Defendec is so exciting.” Detect intruders and safeguard premises At the forefront of this new, ongoing partnership will be the Verifeyed+ product series, a sophisticated alarm system with video verification which employs Artificial Intelligence (AI) to detect intruders and safeguard premises right around the clock. Verifeyed+ is a wireless, battery-operated system which allows cameras to be deployed anywhere without hard-wiring. Thanks to its versatility, it can resolve challenges ranging from protection of construction sites and empty properties, to catching fly-tippers in the act and combating anti-social behavior through covert operations. It is already used to protect borders in more than 25 countries and can be installed immediately, anywhere CCTV cannot typically be fitted, and as well as being rugged enough for tough outdoor use, it can produce high-definition images day or night. Security technology Vacant properties service supports thousands of property managers and owners Defendec Vice-President and General Manager UK & Ireland Simon Faulkner said: “Orbis Protect and Defendec are forward-thinking companies, united by a determination to embrace new ways that technology can overcome security challenges. We pride ourselves on an ability to develop ground-breaking security technology and Orbis Protect will harness our technical expertise which constantly pushes back boundaries in search of simple but effective solutions.” Protection of vacant properties is right at the heart of Orbis Protect’s operations. Over the last 40 years it has provided property, site and personal protection services to its clients and has grown to a business employing more than 400 people across the UK. The company’s vacant properties service supports thousands of property managers and owners and is an essential component of their business continuity plans. Specialist teams provide support to clean and clear more than 60,000 empty properties each year, playing a significant role in bringing them back into productive use.
Namib Property Patrols Ltd, the Oxfordshire-based security and protection company, is using employee scheduling and mobile workforce management software SmartTask to streamline operational processes, saving both time and money. The company is using the software for proof of attendance and guard monitoring across its mobile patrol and alarm response operations, which has helped reduce in administration by more than 15-hours a month, while enhancing service delivery to customers. Credible and transparent security services “We strive for quality through technology, so we needed a software solution that would enable us to serve our customers better; operate on tight margins in order to give value for money; and continue to innovate,” explains Joel Shikongo, Operations Director at Namib Property Patrols Ltd. “SmartTask is enabling us to deliver high-quality, credible and transparent security services in the most efficient manner possible.” The simple expandability of the software is enabling the company to take a phased roll-out" SmartTask was selected following a review of the marketplace to replace manual processes that had become time-consuming and no longer met the reporting needs of the business. The simple expandability of the software is enabling the company to take a phased roll-out with plans to adopt additional functionality, such as SmartForms for electronic incident and logbook reporting, in the next 12 months. Alarm response callouts Namib Property Patrols uses SmartTask at around 40 commercial and industrial sites within Oxfordshire to record arrival and departure times for mobile patrols and alarm response callouts. For scheduled patrols, active tags are used at critical and vulnerable points around the customer’s premises, which are scanned by an asset protection officer using a SmartTask-enabled smartphone. These tags can also contain unique messages to communicate specific tasks and patrol requirements. Namib Property Patrols has full visibility of completed work and officer welfare from its head office in Bicester, with the ability to create electronic operational reports at a push of a button. Clients can also log in to an online customer portal to view their individual security activity in real-time and generate bespoke performance reports. Reducing printing costs Our software is already delivering proven results for a wide range of businesses" As a result, the company has been able to dramatically reduce the time needed to compile reports, saving more than 15-hours each month, as well as reducing printing costs by around 50 per cent. “SmartTask is an ideal fit for our brand and values, underpinning our commitment to operational excellence and client satisfaction. The software is not only helping us to streamline our processes and operate more effectively in an ever-evolving world, but also retain and win business by always putting the customer first. SmartTask’s team is always on hand to provide first-rate support and is constantly looking at new ways to improve our service delivery, so they are a highly-valued technology partner,” adds Shikongo. Mobile workforce management solution Paul Ridden, CEO of SmartTask commented: “We have created an employee scheduling and mobile workforce management solution that is highly configurable and feature rich, so is a perfect fit for SME, mid-sized and top 30 security companies alike. Our software is already delivering proven results for a wide range of businesses by helping them to better plan, manage, deliver and report on their security services.”
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that Devon House at St. Katharine Docks, an office building in London’s East Side, has installed a unique TQM manual revolving door at the main entrance, in addition to two arrays of Speedlane Swing optical turnstiles, to increase lobby security. Devon House is an exceptional riverside workspace. Originally built in 1989 as part of an historic redevelopment by an Act of Parliament, Devon House has over 48,000 sq. ft. of office space, as well as a dedicated on-site café, co-working hub, riverside courtyard and 97 bike spaces. The building is surrounded by shops, restaurants and bars, and has direct transport links close by. Merging characteristics of two doors In the spring of 2019, a full refurbishment was completed, both internally and externally, that included a brand new reception space. The new lobby is now an open social space, echoing the relaxed atmosphere of a coffee shop while taking in the expansive views of the riverside. It also serves as a coworking hub outfitted with several tables and chairs to be easily accessible to both employees and visitors. The door’s sidewalls and wings would be metal-framed with aluminumThe renowned architect working on the Devon House project, Stiff and Trevillion, specified a manual revolving door for the main entrance, but requested a special design: they chose to merge the characteristics of two doors – the Boon Edam TQM and the all-glass Crystal TQ. The door’s sidewalls and wings would be metal-framed with aluminum, but there would be no metal canopy: only an 18mm thick, slender and transparent all-glass ceiling, allowing light to flow in through the entrance unimpeded. Optical turnstiles to control access Designers for Devon House decided on optical turnstiles to control access in the lobby and deter tailgating attempts. They allowed building capacity to dictate the number of lanes that would be needed, using a calculation that considered both the total capacity and traffic changes during peak times of the day, such as the morning and evening rushes, and bi-directional traffic during lunchtime. In addition, wide lanes were placed on each side of the reception desk to accommodate disabled access. Once the quantity was decided, focus shifted to design. The Speedlane Swing optical turnstiles were chosen for their slim cabinet design and swinging barriers and customized with a black powder coated finish to match the lobby’s décor. Today the building is fully operational and Boon Edam looks forward to working with Stiff and Trevillion on future projects.
Upgrading a two-wire analog intercom to a conventional IP video system typically involves messy and costly rewiring work. So what happens when there is a need to install over 500 IP systems into a single building? One company, Hikvision, has developed an innovative two-wire solution, which is already making waves at the luxurious RiverGate condominium in Singapore. “If someone rang the bell at the side entrance, it wouldn’t always ring in my apartment upstairs,” says the Chairman of the Condo Council, who lives at the RiverGate condominium in River Valley, Singapore. “Visitors often had to call me to let them in, and I would have to travel down 20 floors to the main entrance. It became incredibly frustrating.” Switching from analog to IP system The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it" The resident’s story is typical of millions of residents across Asia, where high rise living is the norm. In Singapore, the first condominiums were built back in the 1960s, to tackle the challenge of high population density and soaring land costs. Today, high-rise living in Singapore is not only necessary but highly desirable, with many condominiums offering swimming pools, spas, sky-gardens and a host of other deluxe facilities at exclusive locations across the island. Nevertheless, even the most luxurious apartment blocks are wrangling with aging access control systems. Many systems only work intermittently, while all but the newest builds feature intercoms that use out-dated two-wire analog cabling. “The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it,” says Daniel Han, Engineering Director at Serron Technology. Hikvision IP security systems Making the move to IP intercom systems is a logical step, as it would offer a host of benefits to Asia’s high rise residents. First of all, IP systems are video-based and can work with HD cameras, giving homeowners crystal clear images of who is at the door potentially dozens of floors below. What’s more, they also typically link to an app, so residents can see and interact with the person at the door – even when they’re not in the apartment. “Video IP systems are much more functional, more future-proof, and incredibly reliable,” adds Daniel. The problem is, most of today’s IP intercom systems typically need to replace wire for an internet connection – and that means an upgrade to the building itself. “To upgrade to an IP system across a whole condominium is a massive job,” Daniel confirms, adding “Chasing out walls and replacing wiring is disruptive, messy and a time-consuming task. In addition, the task is also expensive, and management companies would have no choice but to pass this cost on to the residents." Two Wire IP Video Intercom System Although it may seem like an impossible problem, one company – Hikvision – has provided an excellent solution. As its product name suggests, the company’s Two Wire IP Video Intercom System is purpose-built to work over existing two-wire cabling, so that two wires supply power and transmit voice, video and control signals at the same time. At the heart of the Hikvision two-wire system is the Two-Wire Video/Audio Distributor (DS-KAD706). It’s this intelligent box that makes the two-wire solution possible by consolidating power and internet connectivity, enabling it to be distributed out to the external door video stations and the indoor video units. Hikvision two-wire solution Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station with a video screen At Singapore’s luxurious RiverGate Condominium complex, the management team was so impressed with the potential of the Hikvision two-wire solution that they have already installed it into the condominium. Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station (DS-KH6320-WTE2) featuring a video screen, while each of the entrances to the building has a Video Intercom Door Station (DS-KD8102-V) featuring an HD camera. If someone calls an apartment via a door station downstairs, it rings the appropriate indoor screen. The resident can see the visitor and have a conversation with them, before letting them in with a simple tap of the screen. Hikvision Video Intercom Master Station (DS-KM8301) The RiverGate central management offices also have the Hikvision Video Intercom Master Station (DS-KM8301), to monitor the building perimeter and control entry. Plus the complex has installed a number of Hikvision’s Waterproof and Vandal-proof Card Readers (DS-K1104M), to ensure that only authorized individuals can move around the building. What’s more, by downloading the HikConnect app, residents can be alerted to a visitor when they’re away from the video unit, or when they’re out of the premises entirely. The app offers the same functionality as the video screen – allowing residents to see visitors, speak to them, and even choose to let them into the building. Reliable and innovative IP-based solution The benefits of the new Hikvision system are far-reaching. From a building management perspective, the ability to use the existing two-wire system has kept installation costs to a minimum. The ability to use the existing two-wire system has kept installation costs to a minimum “Hikvision’s Two Wire Video Intercom System is a state-of-the-art product, and ideal for retrofitting and modernizing large residential and office building projects. Across Asia, there are thousands of high rise buildings whose access control systems desperately need upgrading. This sleek system provides a cost-effective and elegant IP-based solution – one that’s ideal for high end residential or commercial environments – for minimal cost and disruption.” said Jacky Xie, the Project Manager at Hikvision, who is very optimistic about the potential of the company’s two-wire IP solution. High-performance video and access control system And of course, it’s had a huge impact on RiverGate’s residents. One of the residents’ of the Condominium said, “The new intercom does more than the old system. I particularly like the functionality of mobile app – I can use my phone to let visitors come in even when I don’t have access to the indoor device, like when I’m not at home or using the bathroom. It’s also such a relief to have an access control system that works reliably. I love it; it’s more convenient, it’s really easy to use, and I feel safer.”
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation. The airport contains three runways, two of which are used by commercial aircraft. The airport offers ground transportation, free parking, a Subway restaurant, and many other services such as hangar space and flight training to name a few. Previously, Valdosta Regional Airport operated a legacy Matrix access control system. The proprietary system, including the readers, panels and software, was outdated, making it difficult and expensive to obtain replacement parts. Building automation systems Looking for an open solution, Valdosta Regional Airport turned to Allcom Global Services for their expertise and upgraded to AMAG Technology’s Symmetry SR Retrofit Access Control system with HID readers. “Symmetry integrates into various video, intrusion and building automation systems,” said Kevin Cioffi, vice president, Allcom Global Services. Valdosta has more freedom to research competitive pricing and alternative options" “By choosing an open system, Valdosta has more freedom to research competitive pricing and alternative options. We are thrilled they have chosen Allcom. We gutted all the circuit boards and changed them to the Symmetry panels,” said Tim Register, operations manager/airport security coordinator, Valdosta Regional Airport. “We kept the antennas and how the data was transmitted. All the mounts stayed the same; we just swapped in Symmetry and it worked.” Integrating different technologies Symmetry controls access to the perimeter of the airport including the vehicle access gates and all outside doors facing the Security Identification Display Area (SIDA). The SIDA includes all areas that have access to the commercial apron and tarmac. The SIDA also requires a reader with a PIN-plus-card swipe to open, which make up 75% of the airport’s readers. The remaining Airport Operations Areas (AOA) require only a proximity card swipe to open, which are mostly internal doors and the main entrance. Thirty-two new HID proximity card readers were installed in total. To get the open system the airport required, Valdosta Regional Airport replaced older panels with Symmetry SR panels. As the Symmetry system changes or expands, integrating different technologies or adding more readers will be easy and less expensive. More economical approach The simple job of creating a badge for a user was cumbersome and time consuming with their old system The security operators found Symmetry much easier to learn and use, saving money and hours in training time. The simple job of creating a badge for a user was cumbersome and time consuming with their old system. With Symmetry, badges are created on demand, onsite, with no hassle or extra charge. “Symmetry provided us a more economical approach to facilitate the same thing we used to do with a more expensive, proprietary system,” said Register. “It is much easier to create a badge with Symmetry.” Life flight helicopter Airport authority employees, TSA, airline employees, fixed based operators, life flight helicopter and fixed wing aircraft are all protected by Symmetry. In addition to the perimeter, Symmetry controls access to all work areas within the airport and to the hangars located inside the perimeter fence. “An incident happened one Sunday morning where a car hit a pole and brought the power down,” said Tim Register. “If we were operating the Matrix system, it would have been down for hours. Our Symmetry system was only down minutes.”
Intelligent LiDAR sensor technology from OPTEX, a globally renowned sensor manufacturer, is helping to protect the Belfast Call Centre premises and employees of a Fortune 500 company. Redscan laser sensor The Redscan laser sensor, which was installed by ZEST Fire & Security, a fire and security systems specialist, was required by the company to increase security in private areas of the facility only accessible to authorized personnel. This area, however, is only separated from the rest of the office space by partition walls which leave a gap between the wall and ceiling. OPTEX LiDAR creates a ‘virtual’ detection area that cannot be seen by the naked eye and that can be easily adjusted to the site requirement using the configuration software. In this instance, the REDSCAN RLS-2020S creates a virtual wall between the top of the partition wall and the ceiling of the building, and monitors movement or objects being thrown from one side to the other. OPTEX LiDAR technology OPTEX LiDARs work by analyzing the speed, size and distance of the objects detected OPTEX LiDARs work by analyzing the speed, size and distance of the objects detected, meaning they track the objects within the detection area and understand the ratio size/distance of the object. This provides the ability to accurately detect a specific size of object either at a distance or close up. In the event of any movement being detected, a security alarm is raised, and alerts are immediately sent to the 24-hour on-site security team. Masaya Kida, Managing Director of OPTEX EMEA, says “OPTEX’s LiDAR technology delivers the greatest accuracy of detection. We are constantly working to improve our technology to provide the highest quality sensing solutions.” REDSCAN RLS-2020 series Masaya adds, “Thanks to the high sensitivity and high-speed detection of the Redscan LiDAR sensor, it is able to detect a thrown object as small as a USB stick. The exact point of detection can also be mapped and associated with the cameras monitoring this area.” Justin Doherty, Director at Zest Fire & Security, said, “OPTEX provided us with great support and service throughout. The client was very pleased with the speed and simplicity of the installation, and is very happy with the performance of this new solution.” REDSCAN RLS-2020 series provides 95° detection and either 20x20m or 30m radius detection range and PoE connectivity.
The Smart Cities Mission is an innovative initiative by the Government of India to drive economic growth and improve the quality of life of people. It aims to achieve this by enabling local development and harnessing technology as a means to create smart outcomes for citizens. A hundred cities across the country were shortlisted by the government, which were to be promoted as ‘Smart Cities’. Vadodara was selected among those 100 cities to be developed as a smart city in India, to enhance economic growth, and improve the quality of life of people by enabling local area development, deploying smart solutions and harnessing technology. Optimizing city traffic management Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimising traffic management With a population of approximately 2.39 million, Vadodara is the third largest city of Gujarat, and a major industrial, cultural and educational hub of western India. The city is compact and crowded, with a vibrant cultural life that draws a lot of traffic. It is vulnerable to situations of overcrowding, road accidents, criminal activity, and natural disasters. Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimizing traffic management, without disrupting daily lives. To this end, they sought a state-of-the-art, open platform that could expand in phases, in sync with the city’s growth. Unified Video Computing Platform As Vadodara’s expansion plans are underway, so too are discussions about growing the city-wide surveillance system. As part of the initial process, a project team comprising Smart City officials, Videonetics, and technology partners did an extensive research to mark out key areas and traffic junctions across the city. Going a step further, Videonetics developed a solution based on its Unified Video Computing Platform (UVCP) for the entire city, so that its people, property, and assets remain secure. State-of-the-art AI & DL powered Intelligent VMS and Video Analytics to provide continuous viewing and recording, enabling security operators and law enforcement to proactively identify, and effectively respond to, events to mitigate their impact. Specifically, now the law enforcement authorities can automatically detect overcrowding, unattended baggage, and perimeter intrusions, even under the cover of darkness. Automatic Number Plate Recognition (ANPR) system across 15 traffic junctions in Vadodara, to identify suspected/ unwanted vehicles and non-standardized number plates, as well as to generate detailed reports on vehicle movements, and much more. Command Control Centre, to provide a bird’s eye view to operators, about what is happening across the city. From traffic control to citizen security, operators remain alert and ready. With greater situational awareness, municipality officials are proactively responding to incidents such as garbage overfill, incidents of water-logging, traffic congestions, hazardous debris on roadways, illegal parking, and more. Video surveillance systems Videonetics’s solution manages over 550 IP cameras throughout the city of Vadodara Under the project, video surveillance was deployed along public ways, in urban passenger transport stations, municipal buildings, traffic junctions, entry and exit connecting roads to city, and more. To date, Videonetics’s solution not only manages over 550 IP cameras throughout the city of Vadodara, but also proactively identifies and effectively responds to events, to mitigate their impact. Furthermore, the video surveillance system helps in the maintenance of peace in the city, in upholding law and order, and providing better policing services. The key results are: 1. Increased safety and security with 24x7 monitoring of city area, 2. Faster crime investigations, 3. Traffic police having in-depth knowledge on vehicle count and movement, and 4. Swift action by on-site traffic police, as they get alerts on traffic congestion, unwanted/ hot-listed vehicles, and so on. City surveillance Moreover, Videonetics’s solution has also been able to help the police in monitoring celebration of festivals and VIP movement in the city, and building a security net for its citizens. Overall, it has been successful in ensuring the safety and security in the city of Vadodara, and has played an important role in becoming a smart and connected city.
The prestigious Jewel complex at Singapore’s Changi Airport is receiving the highest standards of perimeter protection, thanks to the manufacturer of road blockers, bollards and vehicle barriers, ATG Access. Singapore's Changi Airport, which has scooped the title of the world's best airport for seven years running, has strengthened its position with the launch of Jewel – a mixed-use, lifestyle hub for visitors. Taking more than four years and $1.25 billion to build, Jewel covers 1.46 million square feet and includes sky gardens, the world’s largest indoor waterfall, aviation lounges, restaurants and over 300 shops. The extension to Changi Airport aims to position the facility as a leading, competitive, and safe international airport for its millions of visitors. As such, it needed the very best in perimeter security. Tested lift-out bollards In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product As the main airport site is fully operational 24/7; the security measures placed around the terminal needed to be installed quickly and effectively. With this in mind, ATG Access utilized its reputable shallow mount technology, which delivers maximum security with minimum disruption. More than 1,000 impact-tested Shallow Mount Bollards and Shallow Mount Lift-out Bollards, requiring a foundation depth of just 112 mm, were deployed around the airport. To ensure the security products complemented the aesthetics of the terminal and surrounding areas, they were coated in varying shades of silver to suit. In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product, meaning it was one of the first impact tested lift-out bollards in the industry. Critical national infrastructure Following this, all of the products were developed at ATG’s manufacturing facility in Singapore. Gavin Hepburn, Managing Director at ATG Access, said: “With over 66 million passengers traveling through the airport each year; the new and iconic Jewel project required outstanding perimeter security measures to protect the asset and its passengers. Changi airport has taken its security very seriously over the last eight years, ensuring all terminals are protected from potential terrorist attacks or security breaches - after airports have been identified by security services as critical national infrastructure. This project has been our third biggest perimeter project to date, after Hamad International Airport Project (Doha) and Jubail Industrial Project, KSA, and we are proud to have been selected as their security provider.”
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Beyond Security - Access Control For Multi-Tenant SitesDownload
Reducing The Cost of Video Surveillance System Deployment and OperationDownload
RFID and Smartphone Readers in Physical Access ControlDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals