Physical Security Information Management (PSIM)
Hanwha Techwin America, a supplier of IP and analog video surveillance solutions, will debut its next generation Wisenet 7 SoC (System on Chip). Built from 30 years of innovation in video surveillance solutions, the highly anticipated announcement sees the continuation of the Wisenet line of custom-built SoCs designed specifically to address the unique challenges of the security market. New key features include cybersecurity features, clear images in all lighting conditions, improved lens disto...
Johnson Controls, a global provider of smart and sustainable buildings, is launching OpenBlue - a complete suite of connected solutions and services that combine the Company’s 135 years of building expertise with cutting-edge technology. This open digital platform, when integrated with Johnson Controls core building systems and enhanced by Fortune 100 technology partners, will make shared spaces safer, more agile and more sustainable. Johnson Controls OpenBlue is the culmination of years...
ASIS International, the world’s association of security management professionals, offers the ability for security professionals to participate in remotely proctored exams for its board certifications. Following the COVID-19 pandemic outbreak, this new option allows professionals who cannot-or would rather not-travel to their nearest Prometric test center to sit for their exams in their own home or office: anytime, anywhere, at no increased cost. Taking exams remotely Using Prometric...
Axis Communications makes audio systems smarter and easier than ever with a line of network audio solutions built for scalability and flexibility based on the customers’ needs. Easily install and manage Axis audio solutions and instantly improve customers’ business operations and security. Axis all-in-one audio solutions can be scaled to fit different spaces and are flexible enough to deliver the right message at the right time and place. Intuitively manage thousands of audio device...
Allied Universal®, a security and facility services company in North America, received a letter of appreciation from the U.S. Department of Justice’s United States Marshals Service. The letter of appreciation was regarding the apprehension of Gerald Hunter, who was #1 on the Most Wanted list of the Drug Enforcement Administration’s (DEA) St. Louis Strike Force’s West Central Region. Crucial security intelligence This is due to his suspected role in the illegal traffi...
Boon Edam Inc., a global provider in security entrances and architectural revolving doors, announces the 40th anniversary of the launch of the company’s renowned Tourlock security revolving door. The demand for this reliable security entrance, first built in 1980, continues to grow as the risks to organizations due to unauthorized entry increase. The Tourlock is used in thousands of facilities worldwide including commercial campuses and government buildings due to its high level of throug...
Places of leisure, where people spend their downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. They can’t just lock be locked down and hope that no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk, separating authorized from unauthorized people and locations, is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent locking solutions Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. The right access solution can help system administrators do it safely without putting a burden on those responsible for everyone’s security. Controlling access to outdoor sites and visitor attractions Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote, far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere, thereby matching or exceeding the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within the system exactly like standard interior locks. Intelligent electronic key systems Intelligent electronic key systems are budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems can be rolled out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attract tens of thousands of tourists every year. Both mechanical and electromechanical locking solutions protect a site, which houses critical infrastructure and watersports facilities, with disparate security needs. Here, electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed, when keys are lost. Permissions are simply deleted from the system software. Upgrading zoo access control system In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours, for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector Securing museums, open spaces with priceless contents presents one of security’s biggest challenges When Edvard Munch’s painting ‘The Scream’, was stolen from an Oslo museum in 1994, thieves left a note which read, ‘Thanks for the poor security.’ Securing museums, open spaces with priceless contents presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key to be able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation with obvious security benefits. Companion software makes key tracking straightforward, with administrators always knowing who exactly is carrying credentials and they can refine or amend those permissions quickly, and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Protecting high-value assets and exhibits London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Electromechanical locks now control access through 56 doors, forming part of a security ecosystem, which incorporates traditional mechanical locks as well. Using intuitive management software, security managers ensure every staff member accesses only the right areas. CLIQ from ASSA ABLOY installed at museum The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be ‘subtle, but ever present,’ according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. CLIQ access control technology This was the checklist facing France’s Musée Maurice Denis, the museum is inside a listed 17th century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered class-leading security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Robust, hard-wearing cylinders and padlocks installed Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside, and outside the main building with waterproof padlocks protecting CCTV camera that are housed on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th century warship, Vasa demand Sweden’s highest level of locking, Class 3. Yet, the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. CLIQ Remote electromechanical technology Around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now, facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites According to one study completed two decades ago, people spend 87% of their time indoors. The number is probably higher now and includes a huge chunk of everyone’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here, over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Benefit of CLIQ electromechanical cylinders Yet, a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key, which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail, who accessed which lock and when, takes a couple of mouse clicks. Electronics-inside CLIQ locks CLIQ also cuts Festival Place operational costs. The electronics-inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever we gather to enjoy leisure, indoors or outside, CLIQ enables easy access control for all openings with just a simple, single, programmable key.
Boldon James Ltd, a technology company providing data classification and military messaging solutions which enable customers to effectively protect data, enforce controls and manage data distribution, announces it has partnered with Germany’s solutions specialists for cryptography and Public Key Infrastructure, cv cryptovision GmbH. This partnership will provide government agencies and defense organizations with the ability to email securely across different security domains. The two organizations have been collaborating to develop a software component system which has now been deployed into a major German government agency. Enforcing communication protocols With enterprises, government agencies and institutions increasingly challenged with sending secure emails across multiple domains, Boldon James and cryptovision have integrated their respective products to deliver a combined solution to meet the growing need to protect data as it is used in increasingly remote and complex environments. Boldon James SAFEmail Military Messaging enforces communication protocols and delivers 'defense ready' secure messaging to NATO and other defense forces. For the past 20 years, Boldon James has been pioneering the way with Military Messaging Handling Systems (MMHS) using Microsoft Exchange as the core messaging service. SAFEmail enables the safe handling and control of a wide range of sensitive data from unclassified data to the high levels of restricted Government classifications across a variety of messaging environments. Strongest encryption methods Cryptovision’s GreenShield Suite is a complete solution for email encryption and digital signatures Cryptovision’s GreenShield Suite is a complete solution for email encryption and digital signatures, delivering the highest level of security and user convenience. It is approved by the BSI (German Federal Office for Information Security) for VS-NfD, NATO and EU-restricted communication. The solution offers end-to-end encryption with the strongest encryption methods currently available in the market. The GreenShield Suite consists of two products, GreenShield File and Mail, seamlessly integrated in Microsoft Outlook, IBM Notes and Microsoft Windows. Both products work collaboratively to ensure files can be encrypted and securely managed in the usual working environment. These are integrated into the respective email systems and enable the secure processing of emails including attachments. High levels of confidentiality Alan Borland, SAFEmail Product Manager at Boldon James, said: “With government and military agency emails in danger of falling into the wrong hands, Boldon James is keen to innovate to meet the demands we see in this space. By integrating our military messaging and data classification solutions with cryptovision’s encryption and security functionalities, this enables us to offer a solution that supports the needs of this growing marketplace.” Ralf König, Senior Product Manager at cryptovision comments: “This integration enables cryptovision to deliver a solution where intended email recipients are able to decrypt and read the message in a safe and secure environment. With Boldon James we aim to ensure the high levels of confidentiality required by many of our military and government clients based in NATO and EU member states.”
Identiv, Inc. announced the launch of its frictionless, battery-less uTrust UHF Credentials that work with identification applications that require long-distance reading. Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. Long-read applications The credentials can be read through badge holders, handbags, pockets, and backpacks, supporting touch-free, highly hygienic physical access control. “For today’s most critical pandemic-era environments, Identiv is focused on providing solutions that support the safest, most hygienic physical access control,” said Stephane Ardiley, Director, Product Management. “Our new uTrust UHF Credentials harness ultra high-frequency technology for long-read applications - meaning your access card never has to leave your pocket as you enter gates, buildings, or controlled areas in schools, hospitals, or other hands-free locations. Beyond access control, uTrust UHF Credentials can be utilized in emergency situations or in the medical field for real-time people and object tracking.” Radio frequency identification cards uTrust UHF Credentials can keep track of people to increase personal safety and facility security Identiv’s uTrust UHF Credentials provide multiple options for durable, interoperable radio frequency identification (RFID) cards. UHF technology (operating in the 860 - 960 MHz frequency range) delivers outstanding performance for long-distance, multiple, reliable readings of credentials, including cards and tags. Leveraging the short wavelength of UHF technology, they are the ideal solution for reading people or items from a significant distance (i.e., more than 18 – 21 feet). uTrust UHF Credentials can keep track of people to increase personal safety and facility security, capture guest/visitor data, and can support 125 KHz low frequency (LF) and/or 13.56 MHz high frequency (HF) interfaces. The credentials are EPC Class-1 Generation-2, ISO/IEC 18000-63:2013, and RAIN UHF RFID-compliant and are compatible with a huge selection of second-generation UHF readers available on the market today, including handheld, stationary, or desktop readers. Time and attendance Offered in regular credit card plastic format (CR80) for corporate or government personnel, uTrust UHF Credentials are available in two models: ISO PVC UHF LF Card and ISO PVC UHF DESFire EV2 2K Card. Identiv’s cohesive collection of touchless solutions are focused on reopening public venues and workplaces as safely as possible. Identiv’s portfolio of credentials, ID cards, and smart cards are available in a variety of form factors for physical and logical access control, converged access solutions for building and computer access, transit payment, brand protection, time and attendance, cashless vending, and Internet of Things (IoT) applications. Solutions are available as single-technology, multi-technology, or credentials with a contact chip.
Bringing extensive knowledge of physical security and cloud-hosted solutions to the position, Jeff Ross has been appointed Director of Marketing for Feenics, Ottawa, Canada. Feenics will tap the expertise of Ross, who has held senior product and marketing management positions at companies, including Lenel (UTC), ICx Technologies, RedCloud Security (Avigilon) and most recently Mavin Technologies. Feenics, maker of the award-winning Keep Access Control as a Service (ACaaS) software platform, will look to Ross to lead Feenics’ global marketing efforts and build upon the company’s current momentum as a market innovator of secure, authenticated AWS cloud solutions. For Ross, it’s the opportunity to heighten industry awareness and recognition of the superior advantages of the Keep by Feenics™ hosted access control platform. Product management and marketing roles “I’m beyond stoked to be on board! This position is a great fit for me and I believe the timing is perfect. I began my journey in the industry as an intern at Lenel and everything I’ve learned in prior product management and marketing roles will serve me well in leading the marketing organization at Feenics,” said Jeff Ross. “I’ve known Sam Shalaby, our CEO, since my early days at Lenel and have always enjoyed working with him. It’s easy to get excited when you see the passion and values that Sam brings to the company, along with his vision for our products.” Communications strategy “Early emphasis will be placed on amplifying and continuing to build out our brands. We’ll be creating campaigns that focus on our strengths to value-added resellers and system users, such as our application’s unprecedented flexibility and scalability. In parallel, we’ll be designing and fortifying our communications strategy - getting in front of customers through a variety of traditional and digital channels. And we’ll complement these efforts by beefing up our product marketing content, further defining our social marketing strategy and exploring new lead generation avenues…all in the name of successfully reaching the growing global customer base of Keep.” Security industry background Ross said he is excited about the inherent benefits of the native, cloud-based Keep platform, as well as recent certifications like FICAM Compliance and GSA listing. “All these elements well position Feenics as a leader in this space today and moving forward.” “While Jeff’s background and understanding of the security industry was important to Feenics, it was his passion about bridging the past with the future of access control to build a strategic value proposition for our customers that stood out most,” said Paul DiPeso, Executive Vice President, Feenics. “Our credibility was instantly elevated with the addition of Jeff.”
ADT and Lyft have expanded their partnership to help keep riders and drivers safe. After a successful pilot to integrate mobile safety solutions into the Lyft platform for riders, they are now expanding that functionality nationwide to Lyft’s millions of riders. ADT’s mobile safety tools Additionally, Lyft is now extending ADT’s mobile safety tools to drivers, allowing both drivers and riders to quickly get emergency help, if they ever feel unsafe during the ride. The driver pilot program has launched in ten U.S. markets on iOS and Android, including Chicago, Los Angeles, and New Jersey, with the intent to implement nationally to Lyft’s community of drivers. The rider functionality is now available nationwide. Here’s how the new driver feature works: Instantly connect with safety specialists: Drivers can alert an ADT monitoring agent right from their app and get a call back quickly. Contact 911 without speaking a word: If drivers don’t answer the alerted monitoring agent, ADT will contact 911 on their behalf and share their location and car details. Receive status updates from ADT: Drivers will see real-time updates in their app with the status of their emergency request, such as when ADT has contacted 911.
Ping Identity, the Intelligent Identity solution for the enterprise, announces the launch of its revamped Global Partner Program, which provides Ping Identity’s extensive network of global technology and channel partners with the tools, resources and technology to grow their business and ensure the success of their customers. There is a booming demand for tailored identity and access management solutions as enterprises continue to expedite their digital transformation initiatives. In a predominantly remote work environment, businesses require turnkey solutions to simplify migration across cloud, SaaS and on-premises data centers and address the realities of hybrid IT environments. Global systems integrators Ping is refining its partner programs to better serve and address the challenges its community currently faces. “Our partners are critical to the foundation, health and long-term success of Ping Identity and are essential to our mission in driving the identity-defined security revolution,” said Kris Nagel, Chief Operating Officer at Ping Identity. Partners are able to receive additional benefits via a tiered program “Expanding and deepening our collective efforts with our global strategic alliance and channel partners allows us to continue to innovate and bring comprehensive IAM solutions to the enterprise.” Ping Identity’s Channel Program has long enabled solution providers, resellers, managed service providers (MSPs) and global systems integrators (GSIs) to grow their business. Now, partners are able to receive additional benefits via a tiered program that recognizes organizations’ strengths and encourages growth via Ping investments. Premier identity verification Partners can expect financial, sales, technical and marketing investments designed to provide positive business impact. As part of the Channel Program, Ping Identity is launching Delivery Approved, a new program with four levels of earned designations that reward partners for making a significant investment of time and resources in building a sustainable Ping consulting practice. By earning a Delivery Approved designation, an organization can earn a formal identification as a preferred Ping Identity delivery partner and trusted advisor. It also provides partners with access to a Ping Identity partner delivery manager, technical enablement support and partner marketing resources. “We look forward to continuing our strategic partnership with Ping Identity as we remain steadfast in our commitment to providing our customers with the premier identity verification and access management services,” said Lorraine Worrall, Chief Sales and Marketing Officer at ProofID. Providing greater security The revamped program provides Ping’s customers with access to additional comprehensive “Ping and ProofID have together delivered value for businesses with diverse needs and are eager to continue to play a fundamental role through Delivery Approved to further advancing these businesses’ outcomes and in driving measured growth.” Additionally, Ping Identity has expanded its Strategic Alliance Program, enabling further collaboration with top-tier technology companies. The revamped program provides Ping’s customers with access to additional comprehensive, cross-application integrated IAM solutions as well as the opportunity to leverage existing infrastructure investments to provide greater security and convenience to their identity platform. “To address today’s IT environment’s increasing challenges of security threats and data privacy concerns, our customers need flexible and scalable security solutions to truly achieve a Zero Trust model,” said Harry Gould, SVP WW Partners at SailPoint. “We know that our joint work with Ping Identity will provide these leading businesses with the AI-driven governance and security that can be effectively deployed across cloud, on-premises, and hybrid environments.”
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.
The general public doesn’t give much thought to the important role of security officers in creating and promoting safer environments. The low-profile work of security officers is vital to protecting people, places and property. During the pandemic, newer aspects to that role have emerged. Security personnel have been called on to perform diverse tasks such as managing queues at the supermarket, safeguarding testing centers and hospitals, ensuring food deliveries, and supporting police patrols. The British Security Industry Association (BSIA) and two other organizations in the United Kingdom are joining forces to raise awareness of the work of security officers and to recognize the vital importance of the duties they perform. BSIA, a trade association, includes members who are responsible for 70% of privately provided UK security products and services, including security guarding, consultancy services, and distribution and installation of electronic and physical security equipment. BSIA, the Security Institute and the Security Commonwealth Joining BSIA in the awareness campaign are the Security Institute, a professional security membership body; and the Security Commonwealth, which is comprised of 40 organizations from across the security landscape with common objectives to build professionalism, raise standards and share best practices. “The recognition of security officers as key workers is the start of a re-appraisal of what service they provide to the community in keeping the public safe and secure,” says Mike Reddington, BSIA Chief Executive. “As we exit lockdown and have to navigate public spaces again, [security officers] will have a crucial role in supporting public confidence. We are working closely with the Police and all other public bodies to find the best way to achieve this.” Security officers acknowledged as key workers The campaign will showcase security professionals as a respected, valued, professional service provider and a key worker that is acknowledged and embedded in daily lives. The British Security Industry Association (BSIA) and two other organizations in the United Kingdom are joining forces to raise awareness of the work of security officers “Great effort has been invested in the professional standards and capabilities of frontline [security] officers, and they have proven their worth during the coronavirus crisis in the UK,” says Rick Mounfield, Chief Executive, the Security Institute. “They, along with the wider security sector, deserve to be recognized, respected and appreciated for the safety and security they provide across the United Kingdom.” “[We are working to] build professionalism, raise standards and share best practices, and I hope this campaign can make more people recognize the changes we have all made and continue to make,” says Guy Matthias, Chairman of the Security Commonwealth (SyCom). The industry will be reaching out to companies, professionals, and organizations in the sector to participate in the campaign. The hope is that, over the coming weeks as lockdown is eased, the industry can play its part to ensure that the country emerges with confidence to start to recover and build for the future. Private security more important than ever The campaign will showcase security professionals as a respected, valued, professional service provider Across the pond in the United States, law enforcement professionals are facing a crisis of confidence during a time of civil unrest as protestors call to “defund the police” and to otherwise undermine and/or recast law enforcement’s role in preserving the peace and ensuring public safety. If an upshot is that public policing is starved of resources, the role of private security to supplement their mission is likely to increase. In short, the role of private security is more important than ever on both sides of the Atlantic. Public recognition of that role is welcome, obviously. In any case, the importance of their role protecting people, places and property has never been greater.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Family-owned and run company, Bijou Wedding Venues, that offers exclusive wedding venues coupled with exceptional food and service, is improving its safety in response to the COVID-19 pandemic by implementing a state-of-the-art body temperature monitoring solution from ANT Telecom to reduce the risk of virus transmission. With restrictions lifting to enable larger groups of people to meet, weddings can begin to take place with greater numbers of guests. Bijou therefore wanted a solution that could enable special days to go ahead with confidence and reached out to ANT Telecom to implement its thermal imaging cameras at wedding venue entrances to ensure a significant reduction in risk to guests. Temperature monitoring cameras With Bijou operating across a range of venues, the cameras will be used to scan guests discreetly as they enter the venues to ensure minimum disruption to the day, and allow full focus to be on the couple’s celebration with families and friends. It comes as part of a range of other initiatives the company is implementing, such as changes to seating arrangements to ensure ample distancing; provision of outdoor ceremonies where possible; new methods of serving food and drink; as well as many other adaptations to minimize risk. ANT Telecom’s temperature monitoring cameras can be set up very quickly and are easy to use. The camera can detect multiple people at the same time, so is perfectly suited to scan wedding guests entering the venue. Protect guests and staff Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption" Sam Cutmore-Scott, Managing Director, Bijou Wedding Venues, comments: “We’ve made a range of changes in light of the pandemic to ensure that weddings can continue as planned and we’re pleased to offer couples this extra layer of safety alongside other measures. The temperature monitoring cameras allow us to protect all of our guests and staff right from the entrance of the venue. This is one of our key initiatives, and on top of this our exclusive venue model means venues can be completely sanitized between events and essentially acts as a private home for the couple, unlike hotel venues which have other people and staff entering and leaving the site.” Discreet notifications Upon camera detection of a temperature above the guidelines, that guest can be discreetly notified by a nominated person on behalf of the couple and alternative arrangements made, for instance inviting them to watch live streamed footage of the ceremony. Klaus Allion, Managing Director, ANT Telecom, states: “We’re delighted to support Bijou in enabling couples’ memorable days to continue and take place as close to as expected as possible. Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption and peace of mind for both the couple and guests at the venue, as well as staff. It’s an essential component of hospitality and event management and will help many types of gatherings similar to this take place safely as the fallout from the pandemic continues.”
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution center for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide. ISONAS Pure IP access control In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS. With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity. Monitoring and tracking visitors to distribution center A major challenge facing the new distribution center was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative. They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks. ISONAS RC-04 reader-controllers installed ISONAS Pure Access software was implemented to give the packaging company remote access capabilities The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution center in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process. In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities. Pure Access Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. “We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader. ISONAS cloud-based platform By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access. If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralized view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
Edgeworx, the edge computing company, has launched a new AI-powered camera called Darcy to help protect workplaces of every size. In addition to detecting signs of fever, Darcy’s AI engine identifies whether individuals are wearing a face mask, tracks self-reported symptoms and delivers a quick, comfortable screening experience ideal for high-traffic environments. Organizations currently face an impossible choice between affordable, but ineffective, temperature readers (such as point and click devices or tablets) on the one hand, and cost-prohibitive medical-grade thermal cameras on the other. Affordable and accurate thermal camera Darcy ends this dilemma by offering the accuracy of a precision thermal camera at a fraction of the price. Darcy costs less than a fifth of the price of competing FDA-compliant thermal cameras, putting it within reach of schools and small businesses as well as enterprises and large retail outlets. To further ensure screening is accessible to all, Edgeworx is offering the first camera free to all public schools. The solution is already being piloted in Bay Area and New York schools. Despite their five-figure price tags, precision thermal cameras are slow, ungainly, inaccurate and hard to operate. Some take as much as an hour to warm up and need regular recalibration. By contrast, Darcy uses artificial intelligence and smart-room sensors to do the work of expensive hardware. Real-time alerts Safety checks will become a feature of daily life as we return to our schools and workplaces" Darcy logs self-reported symptoms via a cellphone app, and checks for temperatures in less than a second, keeping lines moving and avoiding dangerous congestion at entry points. It provides real-time alerts and data reports so organizations can spot outbreaks early, take appropriate action and demonstrate compliance with public health mandates. It can be updated with additional features (such as AI for social distance checks) as public health practices evolve, no additional hardware required. Darcy provides peace of mind to businesses, employees, and customers. Schools and workplaces safe re-openings “Safety checks will become a feature of daily life as we return to our schools and workplaces. But many of these checks will be ineffective because organizations can’t afford high-end solutions that cost tens of thousands of dollars so they rely on devices that have been hastily thrown together and are inaccurate. That has to change,” said Farah Papaioannou, President and Co-founder of Edgeworx. “We developed Darcy because we knew we could use our AI, data and edge computing knowledge to really help people struggling with the challenges of re-opening. We’re focused on protecting all workplaces with a solution that’s affordable and accurate today—and is smart enough to adapt as the world’s knowledge of COVID-19 and other viruses evolves in the future.” Darcy secures Manhattan preschool Manhattan preschool program Kids At Work is among the organizations using Darcy to create a reliable and reassuring screening experience for children and staff. "We were searching for a health check solution that would give families peace of mind and be non-intrusive for our student population, from infants to five-year-olds,” said Julie. Darcy reads temperatures with a margin of error of 0.5 degrees Centigrade Averill, founder at Kids At Work. “Darcy checked all our boxes with its seamless experience, easy record-keeping and affordability. We're also thrilled with the day-long temperature monitoring feature. As an owner, I feel so much more confident about reopening with Darcy.” Darcy owes its speed, precision and low cost to Edgeworx’s edge computing fabric, which allows Artificial Intelligence (AI) to run on the device rather than in the cloud. Darcy’s AI performs many of the functions that require expensive hardware on other devices. Key benefits include: Accuracy and reliability Darcy reads temperatures with a margin of error of 0.5 degrees Centigrade. It overcomes the traditional challenges of contactless temperature monitoring with several innovations: Using AI, Darcy identifies where on a person’s face the reading should be taken, determines if they are close enough and whether they are wearing anything, such as a headband or sunglasses, that would interfere with an accurate reading, and automatically adjusts to body temperature fluctuations caused by circadian rhythms throughout the day and even the weather outside. To offset the effect of room temperature on a reading, most thermal cameras require an expensive scientific instrument called a blackbody reference unit, which maintains its own temperature and is used to calibrate the reading from the camera. Faster readings and less prone to Errors By contrast, Darcy calibrates its readings against inexpensive smart sensors that attach to objects around the room, read the temperature of those objects and report it continuously and wirelessly to the camera. Not only is this significantly less expensive, but also less prone to failure, requires no maintenance and means the camera can be moved without triggering a lengthy recalibration process. Darcy takes readings in less than 100 milliseconds and uses data processing to identify any anomalies. As a result, by the time a person has approached the camera, Darcy may have 10 to 40 readings and can ensure that only a reliable one is recorded. Traditional cameras take only one reading, whether reliable or not, increasing the chances that a person with fever is not detected. Check mask usage and symptoms Darcy goes beyond temperature scanning to help organizations identify high-risk individuals who may not have a fever. Its AI identifies whether the individual is wearing a mask and allows organizations to conduct efficient wellness checks: Visitors complete a symptom survey from their home or phone via an app, which generates a unique QR code to be scanned by Darcy at entry. Additional features can be easily deployed so these devices can adapt as new practices come into play, without costly hardware changes. Avoid long lines and unsafe crowding at entry pointsBecause all the processing happens locally on the camera rather than in the cloud, performance is dramatically improved, avoiding the need for delays while a person’s temperature is checked. Beautifully designed, unobtrusive and with a friendly interface, Darcy makes screening quick, easy and unintimidating. By installing additional cameras in pass-by mode, schools and businesses can continue to monitor temperature and mask usage throughout the day—and throughout the building—without interrupting schedules. Get real-time alerts and compliance reports Darcy provides warnings via SMS, email, app or desktop notification so organizations can get early warnings of facilities where symptoms are trending and create a complete audit trail for compliance with public health mandates. Armed with data, organizations can make informed decisions and implement targeted measures rather than resorting to broad closures. Built-in privacy and securityBecause Darcy handles storage and AI processing locally, it never sends images or sensitive personally identifiable information (PII) to the cloud. subscription Organizations can choose from two subscription packages and schedule a demo - Monthly subscription - Yearly subscription Until the end of 2020, Edgeworx is donating a free camera to any public school that purchases a subscription. To apply for a free camera, one may contact Edgeworx.
Traffic continues to grow in every major city. But how do people beat congestion in these restricted urban spaces? In China’s ancient-walled city of Xi’an, they’re adopting an intelligent traffic management system based on Hikvision technology - and boosting traffic flow while reducing journey time. The Chinese city of Xi'an, known as Chang'an in ancient times, was the center of ancient oriental civilization. Thirteen dynasties spanning Chinese history have chosen Xi'an as their capital. Today, Xi'an is not simply a part of history: it’s a high-tech hub, renowned across China for its scientific research and education, manufacturing, technology, and transportation. In spite of being a modern hub, Xi’an still retains its ‘checkerboard’ layout from the Tang Dynasty, complete with its border of tall and ancient walls. Urban Traffic Administration Nevertheless, while economic growth has enabled the city to develop, the walls place great restrictions on the city’s daily movement - especially to its burgeoning traffic. Vehicles can only enter and exit through the city gates, but with some three million vehicles in the city, the limited number of entrances was beginning to cause serious congestion. What’s more, there are also many ancient ruins in the city, which were further limiting the development of the urban area. Managing a growing city while protecting its history presented a serious challenge to Xi’an Plus, as of 2018, the city was home to over 10 million people, while the number of construction projects was steadily increasing. Managing a growing city while protecting its history presented a serious challenge to Xi’an. So, to address this, Xi’an Urban Traffic Administration turned to Hikvision and its intelligent cameras. Traffic sensing system “Xi’an’s city walls make it impossible to increase the size of the urban area. So, it was only through technology that we could allow the modern city to grow and develop,” says Lihu Ma, the Project Manager from Hikvision. “A core part of the Hikvision solution involves our AI-powered video technology.” The Xi'an traffic police worked with experts from Hikvision, as well as urban planning experts, internet service providers and other technology companies, to design and implement an intelligent traffic management system. The construction of this system fully utilizes Hikvision's core advantages in urban transportation intelligence, employing AI-powered video to create a powerful traffic sensing system. Physical urban transportation network The latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas “Effectively, we are building a bridge between an intelligent digital world and the physical urban transportation network in Xi’an,” explains Lihu. The intelligent traffic management system analyzes comprehensive and detailed data about the movement of traffic through the urban Xi’an area, and uses the insight gathered to make the flow of traffic more smoothly in three key ways. Comprehensive road traffic violation monitoring Xi'an traffic police have installed Hikvision’s Checkpoint Capture Cameras and Intersection Violation Capture Units as part of a monitoring system that can detect illegal vehicle behavior at intersections. These full view ultra-high zoom cameras record vehicles making illegal maneuvers - such as running red lights, making banned turns and illegal lane changes - in real time. What’s more, the latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas. Intelligent cellphone applications Visual integrated command and dispatching platform Using real-time video streams from Hikvision Traffic Flow Capture Cameras, a number of road condition perception technologies, plus intelligent cellphone applications, Xi'an traffic police has created a visual command and control center, coupled with an intelligent police dispatch system. All data is aggregated and dynamically displayed on a large screen in the command and control center. In the event of a traffic incident, the system generates dispatch recommendations intelligently, according to the location and distribution of traffic police officers throughout the city. Those closest to an incident receive an automated message to their cellphone terminals, enabling them to arrive at the scene quickly. Intelligent traffic management system The Xi’an traffic management team also employs congestion management practices More importantly, the intelligent traffic management system uses advanced machine learning capabilities to gain insight into typical congestion patterns, in order to actively identify potential traffic events before they happen. By analyzing large volumes of road condition data and information from Hikvision’s intelligent video cameras, the system can predict which intersections are most prone to congestion and when, enabling traffic police to put evasive measures in place before serious issues arise. Improved vehicle flow capacity with intelligent signal control The Xi’an traffic management team also employs congestion management practices to ease the flow of traffic, largely through the optimization of signal timing. Using Hikvision intelligent video cameras coupled with augmented reality (AR) technology, the intelligent traffic management system analyzes traffic flow data and dynamically alters the timing of signal lights accordingly. Adjusting signal timing It will monitor traffic flow, line length and average driving speed in all directions of intersections in real-time, automatically adjusting signal timing to optimize the flow of vehicles. The Xi'an traffic management system has now been trained with a wealth of traffic data, including Hikvision video, enabling it to build multiple intelligent algorithms for managing congestion in the city. Driver behavior is improving, and drivers are becoming more compliant with the rules of the road First of all, map-based congestion reports suggest that Xi'an's congestion rankings have improved significantly. In fact, compared with the test results of pilot roads before the system went live, intelligent signal control alone has increased the throughput of traffic by 10%, while the average vehicle journey time is reduced by about 12%. What’s more, driver behavior is improving, and drivers are becoming more compliant with the rules of the road. Traffic incident warning function Traffic law enforcement data reveals that traffic offences are generally decreasing, with traffic violations dropping by some 30% in one short-term observation. Additionally, thanks to the proactive traffic incident warning function, the incident detection rate has also increased by more than 30% compared to the traditional model. With the continuous optimization of the system algorithm, plus ongoing installation of monitoring equipment, the accuracy of this identification will only improve. In the process of urbanization, tackling congestion is not only about improving the flow of the transportation network: it’s also basic governance for building a smart city.
HID Global, a worldwide in trusted identity solutions, announced that the University of Connecticut (UConn) has selected its Seos® smart cards and HID® FARGO® Connect secure issuance solution to optimize student services and strengthen security across its five-campus network. The HID FARGO Connect cloud-based platform enables UConn to decentralize ID issuance and eliminate student wait times, while Seos technology eliminates the vulnerabilities of its legacy system. Identification provided to students for access The university’s One Card office partnered with identification solutions supplier, ColorID, to upgrade its Husky One cards - which provide access to student essentials such as dorms, dining halls and printing services - with Seos credential technology to combat card duplication and fraud. “The biggest challenge for UConn was it needed to re-card its campus to bolster security,” said Cassie Bunner, Higher Education Account Manager at ColorID. “We wanted to present the university with a technology we knew and had confidence in. HID was exactly that.” Previously, the university’s card solution utilized proximity and magstripe technologies, which can easily be cloned. UConn’s 40,000 new Husky One cards retained magstripe and proximity technology to minimize disruption to campus life, while adding Seos technology for a phased university-wide transition to iCLASS readers. Once complete, UConn plans to remove proximity technology, further reducing card issuance costs. Campus security credentials “HID Global is leading the way in providing universities with trusted identity solutions so they can revolutionize processes that are vital for student success,” said Craig Sandness, Vice President and Managing Director, Secure Issuance with HID Global. “With our HID FARGO Connect solution and Seos smart cards, UConn leverages best-in-class credential technology to secure its campus and simultaneously consolidates and streamlines its student ID issuance process.” In the future, the One Card office will manage its high-volume credential requirements and expedite student delivery using HID FARGO Connect and HDP5600 printers. UConn administrators plan to encode, print and issue about 18,000 credentials annually from any device on campus with a web interface. “Setting up our university with HID FARGO Connect will allow regional campuses to print cards directly for students - no wait, no temporary card,” said Stephanie Kernozicky, Director of UConn’s One Card Office. “The mobility of being able to take pictures and print wherever we need was a big factor in selecting FARGO Connect solutions.”
Round table discussion
The advent of a truly new market for the physical security industry is a rare occurrence. Particularly rare is a new market that is both fast-growing and provides an environment that is not just conducive to application of physical security technologies but that actually demands it. Such is the case with the market for legalized marijuana. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting the cannabis industry?
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?