Physical Security Information Management (PSIM)
GRAU DATA has announced the general availability of Blocky for Veeam, which protects Veeam backups by denying any file access from unauthorized application processes, amid heightened demand for protection from increasingly sophisticated malware attacks. More sophisticated and targeted malware attacks combined with work from home as a new normal, has opened a vulnerability when it comes to IT security, particularly within midmarket companies. Whereas in the past, businesses could count on restor...
DMP releases its new line of alarm communication radios that are FirstNet Ready™ and approved for use on FirstNet®. FirstNet is built with AT&T in a public-private partnership with the First Responder Network Authority and is the only nationwide, high-speed broadband communications platform dedicated to and purpose-built specifically for America’s first responders and the extended public safety community. It’s the solution to decades-long interoperability and communica...
Boon Edam Inc., a global renowned supplier in security entrances and architectural revolving doors, has published a new whitepaper for architects and security professionals entitled, ‘The New Lobby: How Will Securing Buildings Change in a Post-Pandemic World?’ Physical security plan The publication begins by explaining the importance of creating a physical security plan that addresses and controls unauthorized entry due to tailgating, and continues with discussions around how COVID...
The Physical Security Interoperability Alliance (PSIA) has announced that it has elected Jason Ouellette, as its Chairman and Ewa Pigna, the Chief Technology Officer for LenelS2, a part of Carrier Global Corporation, as its Vice Chairman. Standards-based digital data In addition, Peter Boriskin, the Chief Technology Officer for ASSA ABLOY Opening Solutions Americas, will continue in his role as the organization’s Treasurer. The PSIA membership develops specifications for enabling standar...
Globally renowned access control manufacturer, Inner Range is offering customers the ability to identify close contacts of anyone displaying symptoms of COVID-19 or other infectious diseases, by generating detailed reports of where the infected person has been and who else has been near them. Contact tracing The contact tracing report can be generated and shared quickly and easily. It can show which doors an infected user has passed through, how much time they spent in each area, what time the...
Orange Cyberdefense, the cyber security business unit of the Orange Group, has boosted its UK executive team with the appointment of executive for three senior roles, including new Managing Director, Clive Hamilton. Global ICT experience Clive joins Orange Cyberdefense having spent more than 13 years at NTT Europe (NTT Ltd.), most recently as Managing Director. He has 30 years global ICT experience in network, cloud, data center, security and voice service. Mohammed Lateef has joined as UK Fi...
Genetec Inc. kicks off new podcast series with Privacy by Design Architect and former Ontario Privacy and Information Commissioner, Dr. Ann Cavoukian. Engage, the new Genetec podcast, offers thought-provoking perspectives on the impact of security technology from thought leaders and visionaries worldwide. “When we talk about privacy vs. public safety, I can assure you that it is never privacy that wins, nor should it be. But what I reject, is the proposition that privacy must suffer,” insists Dr. Ann Cavoukian in ‘First Principles’, the inaugural episode of Engage, a new podcast series hosted by Genetec Inc. Engage - A Genetec podcast Focused on exploring key industry themes with global thought leaders and spanning multiple disciplines, Engage - A Genetec podcast, will examine a broad spectrum of safety and security topics, from digital transformation in business, city, and government operations, to vital technology topics including privacy, data sovereignty, and more. It is an important perspective that resonates within the practice of physical security" In ‘First Principles’ episode, Engage hosts Kelly Lawetz and David Chauvin take on the often-controversial topic of privacy. “In the world of privacy, Dr. Ann Cavoukian is a formidable force,” said Andrew Elvish, Vice President of Marketing at Genetec, Inc, adding “While Information and Privacy Commissioner for the province of Ontario, Canada, her work on Privacy by Design sparked a global revolution on how privacy is perceived by putting the onus on providers instead of users.” ‘Privacy by Design’ Andrew adds, “Today, Dr. Cavoukian champions a pragmatic, proactive approach, which she feels is especially important in an age when more personal and behavioral information is being used to track and anticipate our activities. It is an important perspective that resonates within the practice of physical security as much as it does in the wider public.” During this interview, Dr. Cavoukian who is now Executive Director of the Privacy and Big Data Institute at Ryerson University, talks about the importance of adopting a ‘Privacy by Design’ approach to software. She argues that the old ‘check the box’ model for privacy compliance no longer holds up, when considered in light of the type and volume of information being shared. Protecting privacy and upholding physical security When a software solution is designed from the ground up with privacy in mind, organizations don’t have to choose between protecting the privacy of individuals and their physical security, creating a win/win for the individual and the organization. Dr. Cavoukian believes that there can be a positive-sum between privacy and security. “Get rid of the ‘versus’ and let’s embrace privacy and embed it into the code of information technologies, business practices and networked infrastructure,” she adds.
The Alarm.com Smart Water Valve+Meter is now available to service providers partnered with Alarm.com and its subsidiaries to help protect connected homes and businesses from unexpected water emergencies and steep water bills. The award-winning device, unveiled at the Consumer Electronics Show (CES) earlier this year, is an affordable, Z-Wave water shutoff valve that combines innovative technology with high-quality plumbing hardware. Leveraging critical system and occupancy data helps the Smart Water Valve+Meter intelligently respond to large leaks, small drips and leaky appliances that cause billions of dollars in property damage every year. Preventing water damage “We are big fans of the Smart Water Valve+Meter because of the insight it provides, especially around how much water is being used and even wasted at times,” said Matt Madden, project manager at Superior Alarm & Electronics. “The data it provides can help customers be more aware of their water use and costs. Another crucial aspect is its ability to detect and react to water leaks of any size and alert the customer via the mobile app. You can’t put a price on peace of mind.” Designed and developed by Building36, a subsidiary of Alarm.com, the Smart Water Valve+Meter quickly identifies excessive or continual water flows to help prevent water damage, as well as health and safety issues that often result from prolonged low-volume leaks. Water management solution Property owners get mobile alerts about excessive water usage to avoid higher water bills As part of the Alarm.com Water Management solution and overall ecosystem, users can manage everything remotely through a single point – the Alarm.com mobile app. Property owners get mobile alerts about excessive water usage to avoid higher water bills and real-time water use data to guide conservation efforts in their homes and businesses. “Our comprehensive water solution that includes the Smart Water Valve+Meter makes homes and businesses safer from damaging and costly water problems,” said Jeff Bedell, chief strategy and innovation officer for Alarm.com. “The advantages of having a robust ecosystem of connected devices make it easy for our partners to deliver solutions that help their customers protect the things they care about most.” Integrator and installer benefits The Alarm.com Smart Water Valve+Meter has earned multiple awards this year. It received a 2020 SIA New Product Showcase award and a 2020 Security Sales & Integration Most Valuable Product award, for its unique design, function and integration features, such as: Automatic water supply shut-off when leaks are detected Remote control and automation as part of Rules or Scenes from the mobile app or customer website Durable, high-quality manufacturing and materials Monitoring for tiny leaks without the need to shut down the water supply to a property Real-time view of water consumption Patterns behavior to identify and signal when water use differs from normal There are numerous integrator and installer benefits as well, including over-the-air firmware updates to reduce post-installation customer visits and support costs.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Security Center Omnicast™, its video management system (VMS), has received the UL 2900-2-3 Level 3 cybersecurity certification for the second year in a row. The UL Cybersecurity Assurance Program (UL CAP) is a robust certification program that evaluates the security of network-connectable products and vendor processes. It features standardized, testable criteria from the UL 2900 series of cybersecurity standards for assessing software vulnerabilities and weaknesses in embedded products and systems. UL 2900-2-3 Standard The UL 2900-2-3 Standard for Security and Life Safety Signaling Systems was created with three possible levels of certification, ranking with an increasing level of security for each tier, to specifically test physical security systems for cybersecurity robustness. Level 3, for which the Security Center Omnicast™ VMS is certified, is the most advanced. It includes a series of checks including fuzz testing, code and binary analysis, vulnerability assessment, penetration testing, and risk management methodology validation. Cybersecurity certification program “As a global safety science leader, UL is dedicated to promoting safe environments. As part of that mission, the UL Cybersecurity Assurance Program is a robust cybersecurity certification program for network-connectable products, which has to be renewed every year,” said Chris Hasbrook, UL’s vice president and general manager, Building and Life Safety Technologies division. “As a vocal proponent of cybersecurity best practices for many years, we have always given fastidious attention to our own processes and operations. Being awarded this UL 2900-2-3 Level 3 Certification for the second year is another testament to our continuous commitment to cybersecurity,” said Christian Morin, CSO at Genetec Inc.
Honeywell, a global provider of fire and life safety, launched the first tools from its new suite of Connected Life Safety Services (CLSS), its first all-in-one cloud platform for fire safety systems. Honeywell’s CLSS suite of tools, built on the Honeywell Forge platform, enable fire technicians to minimize disruption, prove compliance and reduce time needed for design, installation, commissioning, inspection, maintenance and reporting of life safety systems. “Today’s global environment requires the fire and life safety industry to innovate with solutions that enable facility managers and system integrators to monitor their systems and diagnose issues anytime, from anywhere,” said Sameer Agrawal, General Manager, Global Fire Software and Services, Honeywell. Fire safety value chain “Many facilities are working to create healthier environments and even limiting occupant density to comply with social distancing. With CLSS, we help system integrators provide their customers with the highest level of safety and service and work more efficiently by giving them insight into the system problem before they even get to the site.” Especially in today’s environment, organizations across the fire safety value chain face multiple challenges: Achieving more with fewer resources - many facility maintenance teams are working with reduced staff. Managing challenges of limited access to facilities due to shutdowns. Dealing effectively with safety incidents, where risks remain the same at any occupancy level. Life safety systems Honeywell’s CLSS platform addresses these challenges by enabling systems integrators and facilities management firms to access the data within a fire system from anywhere, without necessarily being physically be at the control panel. Firetron, one of the largest individually owned life safety systems company in Texas, is using the Honeywell CLSS platform to support the development of compliance records for its customers. With more than 600,000 devices under our management, CLSS provides us with a scalable tools" “We’re always looking for the most technologically advanced reporting so that we can reduce customer time and effort during audits,” said David Maloy, President, Firetron. “For example, our healthcare facility customers are under increasing pressure to provide accurate compliance records per The Joint Commission reporting requirements. With more than 600,000 devices under our management, CLSS provides us with a scalable tool to meet our customer service aspirations.” Provides invaluable reassurance Honeywell’s CLSS platform is also being employed by EDSB Group of Companies, a UK-based provider of fire, security, electrical, mechanical and building services, in a 50,000-square-meter logistics center for a freight carrier at East Midlands Airport. “CLSS offers a level of connectivity that provides invaluable reassurance that the system has been commissioned effectively and is being maintained safely,” said Jonathan Parker, Managing Director, EDSB Group of Companies. “We can also see how old every detector is and when it needs to be changed based on prevailing regulations. With CLSS, we can tailor settings based on a customer’s requirements and verify weekly testing is carried out according to their specifications while also logging faults and fire activations.” Improves fire system commissioning Through application of digitization principles and Industrial Internet of Things technology, Honeywell’s CLSS tools make it easier to design, install, test and commission fire systems while helping eliminate errors and manual data entry throughout the designing, commissioning and maintenance processes. These tools can also improve the delivery of on-time completions and the handover of a compliant system with the relevant reports, saving channel partners - and end users - time and money. During planned maintenance, CLSS streamlines the verification of compliant fire system testing and automatically generates and archives compliance reports for audit purposes. Whether using the CLSS mobile app or a PC, facility managers can monitor their systems and easily access compliance reporting. Cybersecurity landscape CLSS automatically captures the testing activity thereby removing any doubt on which device was tested This real-time view also enables technicians to troubleshoot a system remotely, allowing them to arrive on site with the right tools to service a system the first time, truly maximizing efficiency and minimizing disruption. This is even more critical given the industry’s talent gap of skilled fire technicians. Using CLSS tools, Honeywell partners can reassure their end users that they are in full alignment with mandated inspection and maintenance requirements. CLSS automatically captures the testing activity thereby removing any doubt on which device was tested, when and by whom. It also automatically generates suggested corrective actions and planned maintenance recommendations based upon local regulations. CLSS is protected with extensive built-in cybersecurity provisions. Honeywell is committed to proactively monitoring the cybersecurity landscape, ensuring data is safely stored and securely accessible to permitted system users. Ongoing digital transformation Delivering full backwards compatibility, CLSS safeguards investment in legacy systems, while preparing Honeywell partners and end users for ongoing digital transformation. Honeywell’s CLSS platform will continue to integrate the latest smart solutions, enabled by cloud connectivity, to ensure buildings and their occupants are as safe as possible. The CLSS tools are accessible via a cellphone app and web browser. The CLSS tools are available in markets globally via several Honeywell Fire brands, including: Gent, NOTIFIER and ESSER. It will be rolled out to additional portfolios over the next year.
For premises looking to secure rooms in busy public spaces, such as commercial offices, healthcare buildings and retail environments, Code Handle® from ASSA ABLOY Door Hardware provides a stylish, secure and easy-to-fit solution. A sleek and stylish handle with a built-in PIN-pad, Code Handle offers a convenient access control solution for those that need to keep private rooms separate from public areas. Access is granted to authorized individuals via a four-digit code on the handle’s keypad. Code Handle also automatically locks when a door closes, for added security and peace of mind. Access control systems Unlike other costly access control systems, Code Handle can be quickly and easily installed or retrofitted. It is battery-powered and so requires no expensive wiring, and works together with an existing locking unit for ease and convenience – users can keep the current cylinder or lock, and upgrade almost any interior door to Code Handle by securing it in place with simply two screws. Offered with a master code and up to nine different user PINs, Code Handle delivers many benefits over key-operated locks. Not only do businesses have to keep track of keys, which can amount to a great deal of wasted admin and time spent monitoring these, but there is also the cost of getting new keys cut or locks changed should any keys become lost or fall into unwanted hands. Should an employee move on, the PIN for a room can be immediately changed to a different one. Protect private rooms Eryl Jones, Managing Director of the ASSA ABLOY Door Hardware Group, said: “Keeping sensitive files, private rooms, personal belongings and valuable stock safe is critical, but this can be hard to do in busy environments. Public areas with high levels of traffic can be hard to police, but Code Handle delivers a cost-effective and hassle-free solution to protect private rooms from unwanted visitors.” “Complete with a great looking modern design and offered in both left and right-hand options, Code Handle also requires little maintenance, with up to 30,000 cycles provided for each battery. Users also never have to worry about whether they have locked the door when exiting a room, as Code Handle does this automatically.” “Ultimately, Code Handle offers organizations an affordable and secure solution for protecting private rooms from intruders and other members of the public. For those with private rooms that open out onto public-facing spaces, Code Handle is a simple and convenient choice, which can be quickly installed with minimal hassle.”
Dahua Technology, a renowned, video-centric provider of smart IoT solutions, announced a major rebranding to reflect the company’s growth and evolution within the North American video surveillance market. WizSense (pronounced “Wise Sense”), Simplified Analytics for Accurate Results, and WizMind (pronounced “Wise Mind”), Advanced Analytics for Ultimate Performance, will be sub-categories under Dahua’s Analytics+ umbrella. Each line encompasses existing product lines as well as new product offerings. “With this launch, we are unifying our products under two new product categories, WizSense and WizMind, to align with new and existing customer’s needs in finding solutions faster,” remarked Jennifer Hackenburg, Senior Product Marketing Manager of Dahua Technology USA. Video surveillance solutions The rebranding includes a top-to-bottom implementation of the WizSense and WizMind product lines. Changes will be reflected throughout the company’s website including the product search tool filter, datasheets, product boxes and communications. Dahua’s new brand assets include a full quick guide highlighting all products from each segment, a new website landing page and other visual communications to convey Dahua solutions in an understandable way. WizSense, the more foundational of the two categories, offers simplified analytics for accurate results The recategorization is designed to help security dealers and integrators more easily identify which video surveillance solutions are better suited for small installations versus advanced enterprise applications. WizSense, the more foundational of the two categories, offers simplified analytics for accurate results. Smart motion detection Basic enough to meet the needs of most users, WizSense products have an AI chip that delivers features like smart motion detection, perimeter protection, and active alarm for protecting what matters most. Other analytics allow for instant alerts, quick target searches after an event, and maximized storage with Dahua’s Smart H.264/H.265+ codecs. The WizSense portfolio includes 4MP and 5MP bullet, dome, wedge and eyeball cameras that were formerly part of Dahua’s Lite series and that offer Starlight Technology, True WDR, Smart IR illumination and IP67 housing. Also in the WizSense family are 2MP and 4MP PTZs formerly from Dahua’s Pro series, as well as new cost-effective thermal cameras. Compatible with the WizSense collection are NVR and Penta-brid recorders with 2TB, 4TB, 6TB, and 8TB options. Human temperature monitoring WizMind offers advanced analytics for ultimate performance. This high-end analytics line - with a powerful AI chip and renowned deep learning algorithms - gives users privacy protection, video metadata, highly accurate people counting, heat mapping, smart tracking and non-contact human temperature monitoring . WizMind is designed to meet the requirements of high-end vertical markets with in-depth demands, such as finance, retail, stadiums, energy, refineries, and transportation. WizMind cameras consist of formerly-Pro-series 4MP bullet and eyeball cameras, 4MP and 5MP dome cameras, and cameras built for specialized applications, such as 5MP and 12MP Fisheye cameras, multi-sensors, thermal cameras and PTZs. Compatible NVR and Penta-brid recorders come in 4TB, 8TB, and 10TB models. Thermal temperature monitoring solutions These solutions should not be solely used to diagnose or exclude a diagnosis of COVID-19 or any other disease “WizSense and WizMind technologies both take security further by providing advanced analytics that provide deeper insights, increased accuracy, and time saving alerts,” said Hackenburg. “By offering this new streamlined branding, it is easier than ever for dealers to find the line of technology that will include the level of analytics needed for their installation.” Dahua’s thermal solutions, including the SafetyTemp Thermal Temperature Station, the Thermal Temperature Monitoring Solution, and the Handheld Thermal Temperature Monitoring Device, are not FDA-cleared or approved. These solutions should not be solely or primarily used to diagnose or exclude a diagnosis of COVID-19 or any other disease. Telethermographic temperature measurement Elevated body temperature in the context of use should be confirmed with secondary evaluation methods (e.g., an NCIT or clinical grade contact thermometer). Public health officials, through their experience with the solutions in the particular environment of use, should determine the significance of any fever or elevated temperature based on the skin telethermographic temperature measurement. The solutions should be used to measure only one subject’s temperature at a time. Visible thermal patterns are only intended for locating the points from which to extract the thermal measurement.
Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter? Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds. Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents. Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open. COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service. The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
Can a smart card be used securely for multiple applications (and among multiple companies)? End users are demanding such interoperability, and they also want openness to switch out their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that can share encrypted access codes for numerous applications to enable MIFARE DESFire EV2 chip cards to be used across multiple vendors. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are encrypted “keys” – strings of 32 alphanumeric characters encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent EV2 card enables one encrypted key to be used for up to 16 devices (and among a variety of manufacturers). LEAF consortium enables encryption sharing using protocols that ensure each manufacturer’s systems can interface with a card chip in the same way. Specifically, each card has a “shared data structure,” which means that the location of information is arranged on a card chip in a predictable and consistent manner. Member companies adhere to that structure in order to be interoperable using a single credential. There are no license fees or intellectual property rights involved. Secret key The approach involves a LEAF Custom Cryptographic (Cc), a “secret” key owned by the end user but managed by a third party. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of custom-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end user staying in control and having unlimited interoperability.” Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications. Key management service WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF-enabled. They provide a key management service (for life) to end users based on LEAF capabilities. End users “own” the keys and can ask to share them with any other manufacturer. Sharing a key involves two key custodians (engineers), each of whom only has access to half of the encrypted key in order to keep it secure. Combining capabilities The LEAF consortium provides a way for smaller manufacturers to work together to increase their market share without putting anyone’s intellectual property at risk. Working together, smaller manufacturers can assemble systems to compete more effectively with larger manufacturers. In effect, they combine their capabilities rather than compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve in terms of where a biometric template is stored on the chip. Although the standard does not currently offer mobile credentials, mobile functionality will be available by the second quarter of 2021 (or sooner).
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. Today, even air travel seems incredibly risky, or at minimum a huge hassle. The good news is that the industry has adapted well without the shows. A series of “on-line shows” has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. It’s easy to dismiss these sessions as “Death by PowerPoint,” but some of them are incredibly informative. And conveniently accessible from the comfort of a home office. Internet transforming businesses We have already seen how the online world makes it easier than ever to connect with customers. In the consumer space, businesses like Uber, Shopify and Airbnb have proven that the Internet can transform how business is done. But in the security industry, we hear: “You can’t replace the value of meeting face to face.” That’s definitely true to some degree. A lesson of 2020 is the need to take a hard look at the economic model of trade shows However, the reality of 2020 suggests that there are alternatives that are almost - emphasis on almost - as good. And that don’t cost as much. And that don’t take away as much time from the office. And that don’t involve the effort of schlepping luggage through an airport yet again to a hotel in a beautiful city you will never see where you will spend three days in a big exhibit hall eating overpriced hot dogs and regretting your choice of footwear. Economic model of trade shows Sure, you’ll meet up with old pals, and get some value out of the experience. But how much value versus the cost? A lesson of 2020 is the need to take a hard look at the economic model of trade shows - how much they cost versus the value they provide. Considering how well we have gotten along without them, one wonders how and why trade shows have become such an integral part of our industry, and of hundreds of other industries, for that matter. I have had many conversations with exhibitors at trade shows in the last several decades. I have heard probably thousands of complaints about the slowness of the foot traffic, the high costs of exhibiting, the price and hassles of travel. The question I have often wondered (and asked): Is it worth it? Defray the costs Usually, the complaining exhibitor will reluctantly admit that it is, and/or provide some other justification, such as one of the following: All my competitors are here. If I don’t exhibit, it sends the wrong message to the market. That’s why I need to have the largest booth near the front of the show, too, because it’s all about perception and positioning ourselves in the market. We need the show for the sales leads, which drive our sales for the next six months. If I meet one large end user who turns into a big sale, the extra revenue pays for it all and makes everything worthwhile. This is the only time I get to see my sales staff or other coworkers from around the country. We have a sales meeting this week, too, so it helps to defray the costs. Success of alternatives The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come Given the experience of the year 2020 without any trade shows, might some of these justifications melt away? At a minimum, companies will be taking a hard look next year to evaluate what they missed about the trade show experience, and more importantly, what the impact was on their business (if any). What is the future of trade shows? After the 2020 hiatus, exhibitors and attendees alike will be starting with a clean slate, taking a fresh look, reexamining the value proposition with new eyes, braced by the successes (while acknowledging the failures) of alternatives that emerged as necessities during a global pandemic. Ensuring safety and security The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come - including trade shows. During the pandemic, we have all had to reinvent ourselves, deploy new strategies, work around new challenges, and in the end, hopefully, emerge better for it. There’s no reason trade shows shouldn’t undergo the same transformation. And it’s likely the “new normal” could look very different. The security market has found new opportunities during the pandemic, including new applications for existing technology and a renewed emphasis on the importance of ensuring safety and security. That positivity will hopefully carry our industry triumphantly into the new decade, and trade shows will adapt to find their place in the newly revitalized industry. As it should be.
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business center – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognizing a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorized individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to consumers by the operator, and in the operator’s cloud-native environment. The services are expected to be made available to millions of the operator’s fixed broadband customers. The operator has ordered an enterprise-wide perpetual license from Allot. According to the Microsoft Security endpoint threat report 2019, the malware encounter rate in APAC was 1.6 times higher than the global average. In light of these conditions, Allot HomeSecure gives telecom providers in APAC a unique opportunity to deliver zero-touch, fully automated services that protect their customers while generating supplemental revenues. Security for home IoT and smart home devices Allot HomeSecure provides security for home IoT devices and smart appliances Allot HomeSecure provides security for home IoT, smart appliances, and the devices connected to the home network. It integrates into the existing home router with the addition of a thin software client that provides home network visibility, cyber security and parental controls without the need for any configuration by the consumer. Allot HomeSecure uses AI to identify and profile connected home devices and to detect and act upon anomalous device behavior. HomeSecure has the option to be managed from an easy-to-use app for every household that gives consumers control over their network security and parental controls. “Our customer in APAC sees anti-malware protection for all home-connected devices and parental controls as basic requirements for any offering they provide to their millions of fixed broadband customers. HomeSecure gives them a single zero-touch clientless solution that satisfies both of these demands,” said Ran Fridman, EVP Global Sales at Allot.
Otay-Tijuana Venture LLC, a US-Mexican group of companies operating Tijuana International Airport’s Cross Border XpressTM (CBX), has chosen SAFR from RealNetworks’ video analytics technology to be used throughout the San Diego - Tijuana terminal in order to optimize operations and improve passenger flow. The first building to connect the United States to a foreign airport terminal, CBX serves millions of passengers that cross the border as part of their trip, helping them avoid unforeseen delays in the congested border crossings of San Ysidro and Otay. Video analytics technology “We are very satisfied with the performance, specific dashboards, and team support that SAFR offers, providing the necessary insights that are required to run such an important operation like CBX,” said Julio Armentariz, CTO of CBX. The 390 ft long bridge is a hub for many daily situations where technology, process, and people work together to create a safe and efficient passenger experience. AI video analytics technology ensures CBX staff have actionable data at their fingertips as they monitor passenger flows and make real-time decisions. Mask detection feature SAFR has recently added additional features specifically designed to help customers respond to the global COVID-19 “We are extremely proud to help CBX in their day to day operations, contributing to more efficiency and quality of journey for the thousands of passengers that frequent the terminal every day,” said Jose Larrucea, RealNetworks Senior VP of International Sales. SAFR has recently added additional features specifically designed to help customers respond to the global COVID-19 pandemic including mask detection and occupancy counting. CBX has applied the mask detection feature to passenger flow monitoring to better track mask compliance and gather critical operations data. Face recognition technology "We see optimal potential in RealNetworks’ technology and we are looking into expanding its use in other areas within CBX in order to increase operational efficiency," added Armentariz. SAFR offers highly-accurate, fast, low-biased face recognition and additional face and person-based computer vision features. SAFR’s NIST (National Institute of Standards and Technology) scores for speed, accuracy, and bias combine to distinguish SAFR as one of the leaders in real-world accuracy and performance.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
The Headquarters Business Park developed by Adeem Al-Watania is a 52 story office building located on the coast site of Jeddah, Saudi Arabia. When completed in 2012, it became the tallest building in Jeddah and is served by a large 11-story parking garage. Nedap’s Long-Range Identification solutions provide seamless vehicle access to employees and long-term tenants. The devices were successful installed and integrated with Lenel access control system OnGuard by Idex Services. The Headquarters Business Park Tower This tallest skyscraper, towering above Jeddah’s North Corniche and with a unique “Sail of a dhow” design, is an iconic structure in the commercial hub of Saudi Arabia. The iconic business park consists of offices, clinics, restaurants, entertainment facilities and a luxurious hotel. It has three main sections, the West tower housing 52 floors, East tower housing a luxurious hotel with 16 floors and a mid-section with 11 story parking facility comprising of 2.000 parking spots which connects the West and East towers. Need for hands-free vehicle access Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system With the exemplary design of the tower, there was a need for an all-in-one innovative vehicle and driver access control solution which can provide seamless integration with best performance which is in line with the state-of-art services to tenants in one of the most sophisticated buildings in Jeddah. Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system, for convenient, hands-free access to authorized vehicles of office employees and long-term tenants. An efficient solution was identified, with a combination of Automatic Number Plate Recognition and Long-Range RFID (Radiofrequency Identification for Automatic Vehicle Identification). Touchless vehicle access to employees Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags is used to provide convenient vehicle access to employees. UHF Tags, which are thin, flexible, tamper resistant and maintenance free are assigned to vehicles of employees who work in the 256 office units. When the registered vehicle with UHF tag installed approaches the long-range UHF RFID reader installed near the barrier, the vehicle is automatically identified and access is granted for authorized vehicles to the parking facility. Parking access to tenants based on LPR Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres The iconic tower with sea-view includes a luxurious hotel and it is observed that tenants stay for a longer duration or prefer coming back on regular basis. To provide a seamless experience to tenants and ensure smooth flow of vehicles and drivers into the parking facility, there was a need for a solution which could grant tenant vehicles access temporarily or incidentally. Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres – ensures tenant number plates are registered and required access rights can be easily granted in the backend application. Securing the 11 floor parking facility With the parking facility being the main entry point to both the West and East tower, it was very necessary to meet high-security standards and control the flow of vehicles. The proposed solution required to have seamless integration with the existing Lenel access control system OnGuard. The open architecture of Lenel and Nedap supporting variety of industry-standard communication interfaces, enabled seamless integration and successful implementation of the products by Idex services. Customized reports with the required log were easily accessible after the successful integration.
WLS has been able to demonstrate the full extent of its product knowledge and technical expertise by providing The Hudson office building with a comprehensive range of electronic safety and security systems which include Access Control, CCTV, fire and intruder detection and Disabled Refuge Alarm (DDA), as well as intercom and an Integrated Reception System (IRS). With approximately 23,000 Sq. ft. of office accommodation spread over 5 floors, and located approximately one minute’s walk from Vauxhall Station, The Hudson is a decommissioned government building which has been transformed into a twenty-first century workplace. Solution The systems installed by WLS at The Hudson include the following solutions: A full L2 fire alarm system incorporating Apollo fire detection sensors integrated with an Advanced MXPro5 control panel. Baldwin Boxall Disabled Refuge Alarm (DDA). BPT intercom which allows visitors to communicate with reception personnel to gain entry to the building. Dahua CCTV which is helping protect the building and its tenants from anti-social behavior and theft! Paxton access control which, in addition to restricting access to private areas, is also able to provide real-time reports for fire and security purposes as to who is inside the building. Texecom intruder detection to protect the building out of office hours. Triax Integrated Reception System (IRS). Integration WLS has implemented various integrations to enable the client to achieve maximum benefit from the respective systems’ functionality. The fire alarm system, for example, has been integrated with the access control system and this allows all doors to be automatically unlocked in the event of fire to ensure no one is trapped inside the building. To avoid nuisance alarms, the fire system has also been integrated with the DDA system, so that the latter will only be activated when there is a fire alarm event. Two-way interaction Two-way interaction between the access control and intercom systems provides smooth, seamless use of the doors WLS has also integrated the fire alarm system with various building services such as the lifts, air conditioning, bathroom vents and the mechanical control panels, to help facilitate an extensive cause and effect strategy. Two-way interaction between the access control and intercom systems provides smooth, seamless use of the doors no matter which of the two systems is used to gain entry, while thanks to the integration of the access control and intruder alarm systems, unauthorized users are prevented from entering the building unless the intruder alarm is unset. Success The contract to implement the turnkey electronic security project was awarded to WLS by electrical and mechanical specialists, Sapphire Mechanical UK Ltd. “Having previously worked with WLS on 14 other projects, we were pleased they were able to submit a competitive proposal for The Hudson and that we were able to once again work in partnership to provide an integrated solution which meets the client’s demanding requirements,” said Nick Power, Commercial Director of Sapphire Mechanical. Electronic security solutions “The rapport we have established with the WLS pre-sales and technical teams has helped ensure there has been good communication throughout every stage of the project and as a result, it was completed on time and without any snags.” “A twenty-first century workplace should have electronic security solutions which are robust, reliable and easy to use, whilst collectively creating a totally safe and secure environment for visitors and those who work within it. I am pleased to report that in this respect WLS has exceeded the client’s expectations.”
Round table discussion
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
The advent of a truly new market for the physical security industry is a rare occurrence. Particularly rare is a new market that is both fast-growing and provides an environment that is not just conducive to application of physical security technologies but that actually demands it. Such is the case with the market for legalized marijuana. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting the cannabis industry?
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?