Radio frequency Identification
Checkpoint Systems, a vertically integrated supplier of RFID solutions for retail, has again demonstrated its commitment to innovation by becoming the first manufacturer to have an RFID inlay, featuring the new NXP UCODE 9 IC certified by Auburn University’s ARC Laboratory. Impinj M700-based RFID inlays The exciting announcement follows news that Checkpoint Systems recently became the first company to achieve ARC certification for its Impinj M700-based RFID inlays. By setting another ne...
Sepura launches SmartChat, a secure operational messaging solution that joins smartphone, tablet, and office-based staff with field officers equipped with TETRA terminals. SmartChat enables mission critical messages to be shared between users on a secure TETRA platform, enabling all members of the operational team to be kept informed and aware of developing intelligence. Crucially, SmartChat enables TETRA radio users to see and share text and image-based communications. It can be extended to mu...
Security stakes are high at healthcare premises. Patients expect and deserve privacy and safety. Yet, most medical buildings must remain welcoming spaces, many open around the clock. The protection of drugs and confidential data is critical, and every breach demands thorough investigation. Such needs go way beyond what mechanical security was designed to meet. Real-time control and monitoring Hospitals, for example, are often large and spread out. Their locks may need to integrate with fire de...
Johnson Controls, a smart, healthy, and sustainable building, and architect of the OpenBlue digital platforms has announced the introduction of eight additions to its popular Tyco Illustra Flex camera series. High performance and safety With enhanced image processing, improved low-light capability, and secure trunk protection against cyber-attacks, the new NDAA compliant Illustra Flex Gen3 cameras are designed to provide high performance, cost-effective solutions for virtually any video survei...
CIE (CIE Security), a global distributor of audio-visual and security brands, is pleased to announce the UK launch of the A05C Access Control Unit from Akuvox (Akuvox Networks). The A05C is the first of Akuvox’s brand new series of smart IP access control readers and features a distinct 5-inch HD color screen that is attractive in design and easy to use. AI and dual-camera Technology The A05C is one of the most advanced IP access control readers available on the market The unit also inc...
HID Global, a worldwide renowned company in trusted identity solutions, has announced it has acquired the Invengo Textile Services Business of Invengo Information Technology Co., Ltd. The acquisition adds radio frequency identification (RFID) tags, readers and cloud-based inventory management services for linen and laundry management to HID Global’s industry-renowned RFID portfolio. RFID products portfolio expansion According to MarketsandMarkets, the global market for commercial laundry...
ASSA ABLOY has acquired the textile services business of Invengo Information Technology Co., Ltd, a globally renowned real-time inventory management platform that combines software, RFID tags, equipment and services, to efficiently identify, track and monitor linen and textile assets. Strategic technological acquisition “Invengo Textile Services is a strategic technological addition to the ASSA ABLOY Group. The company reinforces our current offering within the global RFID ecosystem. The acquisition of Invengo Textile Services enhances the Group’s position within smart components and will provide complementary growth opportunities,” said Nico Delvaux, President and CEO of ASSA ABLOY. “The addition of Invengo Textile Services to HID’s portfolio underscores our leadership position as solution enabler in the RFID market, particularly in the fast-growing commercial laundry sector,” said Björn Lidefelt, Executive Vice President and Head of Global Technologies business unit HID Global. Invengo Textile Services (formerly Tagsys) was founded in 1993 and has some 45 employees. Based in La Ciotat, France, it will be part of HID’s Identification Technologies Business Area. Sales in 2020 amounted to about MEUR 11 (approx. MSEK 110) and the acquisition will be neutral to EPS from start.
Businesses are always looking for cost-efficient solutions to upgrade their security level. AXIS Entry Manager’s customers can now extend access control efficiently and affordably with Aperio battery-powered locks from ASSA ABLOY. Online integration of the AXIS A1001 Network Door Controller with Aperio cylinders, escutcheons, and locks give facility managers real-time control over more doors. Administrators continue to manage every locking point from one AXIS Entry Manager interface, thereby saving time and removing the need to complete extra training. AXIS A1001 Network Door Controller AXIS A1001 Network Door Controller operates on a flexible platform, built to adapt as a site’s security needs change AXIS A1001 Network Door Controller operates on a flexible platform, built to adapt as a site’s security needs change. With this integration, battery-powered Aperio locks are controlled from the same web interface as wired door devices. Because the integration is online, it enables real-time control plus door and user audits on demand. “This integration is the first we have ever done with our access controllers,” explains Ernst Westerhoff, Business Development Manager for Access Control in Europe at Axis Communications, adding “At the end of the day, it costs less for the end-user.” Aperio RS-485 Hub Once installed, an Aperio RS-485 Hub coordinates up to 8 Aperio devices within a 15- to 25-meter range, communicating with the central system via the AXIS A1001. One AXIS A1001 can manage one wired door and one Aperio hub, for a total of 9 doors maximum per controller. AES 128-bit encryption secures all communication between locks and security systems. Aperio locks are wireless, so they require no expensive cabling to install. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates any need for power cabling to controllers. Aperio is cost-efficient during the use phase, too. Wireless Aperio locks Because they run on standard batteries, Aperio locks are much more energy-efficient than equivalent wired door locks. Unlike wired locking, Aperio devices are not connected to mains electricity and use no power when inactive. According to recent ASSA ABLOY benchmarking analysis, choosing wireless over wired locking could bring a large reduction in access control energy use, more than 70% or thousands of euros over a typical installation’s life-cycle. Greater flexibility to expand system coverage Aperio offers Axis end users much greater flexibility to affordably expand or modify their system coverage" “Aperio offers Axis end users much greater flexibility to affordably expand or modify their system coverage. If needs change at a facility, for example, managers want to filter access through more doors, it’s quick and easy for an installer to fit Aperio locks and integrate them online with the AXIS Entry Manager control panel.”, says Lars Angelin, Aperio Business Development Manager at AAOS. The integration allows users to open all wired doors and Aperio wireless controlled doors with the same credential, via almost any standard RFID technology including iCLASS, MIFARE, HID Prox/EM410, and Seos. “We offer to our customers the benefit of easy set-up for wireless access control. They just mount a wireless lock or wireless cylinder to a door and they have full access control,” adds Westerhoff. Streamlining access management The new integration has already been deployed at H-Farm, a business education and innovation hub in Italy. They sought a solution to streamline access management at a geographically dispersed portfolio of buildings. H-Farm experiences rapid user turnover, both because new businesses join regularly and because they organize up to 300 events every year. New locks had to extend the existing Axis system without adding admin workload. Aperio handles, security locks and escutcheons To meet their needs, H-Farm selected Aperio handles, security locks and escutcheons, each easy to retrofit To meet their needs, H-Farm selected Aperio handles, security locks, and escutcheons, each easy to retrofit, so as to ensure that day-to-day work at their offices would not be disrupted. So far, 40 Aperio H100 wireless door handles, plus the Aperio wireless locks and wireless escutcheons, have been installed across multiple H-Farm locations in northern Italy. Most of H-Farm’s interior doors are secured with the award-winning Aperio H100 wireless handle, a former Intersec Access Control Product of the Year. The H100 wireless handle packs the flexibility and affordability of wireless access control into a slim door handle. Wireless access control hardware A standard battery slots inside and powers the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without compromising security. “Aperio wireless access control hardware is solid, nice looking and perfectly fits our environment, solving our access problem,” stated Alberto Aldrigo at H-Farm. H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. With the help of seamless integration from Aperio and Axis, the latest transformation upgrades their own access and security management.
In response to gaps in the short-range air defense radar market, Numerica Corporation (Numerica), a globally renowned company in designing and deploying state-of-the-art defense technology, has announced the development of a new USA-made, 3D radar solution for Counter Unmanned Aircraft Systems (C-UAS) and other short-range defense missions, Spyglass short-range surveillance radar system. Spyglass 3D Radar Designed to fill the need for exceptional C-UAS detection and tracking performance, Spyglass from Numerica will be available soon for a broad set of applications including facility security, border surveillance, convoy and vehicle protection, air space monitoring and more. Spyglass was born out of the first-hand experience with gaps in the short-range radar market" “Spyglass was born out of our first-hand experience with gaps in the short-range radar market,” said Nate Knight, Vice President of Air and Missile Defense at Numerica. He adds, “The rapidly-growing autonomous drone threat presented an opportunity to turn our attention to building a new radar from the ground up that would leverage our decades of experience solving critical air and missile defense problems and applying our proven radar processing and tracking technologies in new ways.” Spyglass will offer advantages, including: Superior precision: Spyglass utilizes Ku-Band Phased Array technology to provide high-precision measurements, improving targeting and classification performance at longer ranges and providing critical time for decision making and threat mitigation. See farther + react faster: Advanced signal processing algorithms and autonomy extend the detection range of the 3D radar allowing users to see farther and faster. Close the gap: Traditional pulse-doppler radar designs leave users blind up-close, while Spyglass' simultaneous transmit-and-receive design ensures threats are not missed at close ranges. Deploy anywhere: With a rugged, solid-state design, low power consumption and low transmit power, Spyglass is built to be deployed anywhere needed. Any mission covered: With embedded C2 and AI software, Spyglass is designed to enable broad-area autonomous sensor networks. Software-defined operating modes enable rapid customization to specific mission requirements. Trusted U.S. partner: Designed and manufactured in the U.S. by trusted defense partners. Efficient detection and tracking of UAS Spyglass is designed to detect and track small, autonomous UAS beyond three and a half kilometers Spyglass is designed to detect and track small, autonomous UAS (Unmanned Aircraft Systems) beyond three and a half kilometers, with precise measurements to support a range of mitigation techniques. With a high degree of configurability and out-of-the-box support for distributed operations, Spyglass’ software-driven control capabilities will enable seamless integration into layered defense systems. “We carefully selected partners for this effort who could support the delivery and integration of Spyglass to key military customers and also leverage the best in U.S. manufacturing talent,” said Jeff Poore, President of Numerica. Collaboration with Liteye Systems and NEOTech Jeff adds, “We have collaborated with respected partners including Liteye Systems and NEOTech to bring to life this 3D radar solution urgently needed by the U.S. Armed Forces.” Liteye Systems, a globally renowned technology solutions provider and integrator of military and commercial solutions based in Centennial, Colorado, will be the exclusive distributor of Spyglass for Numerica. Delivering next-gen C-UAS solutions As an industry expert, Liteye Systems will provide seamless sales support, qualified field service, and expert maintenance to ensure the best performance and experience for Spyglass end-users. In collaboration to bring Spyglass to market, both Numerica and Liteye have built a solid foundation for delivering the next generation of C-UAS solutions. “Numerica has developed an extremely advanced radar solution that comes from deep-rooted experience working with the U.S. military since 1996,” stated Kenneth Geyer, the Chief Executive Officer (CEO) of Liteye Systems, adding “This 3D radar is uniquely designed from the warfighter’s standpoint and Liteye is excited to be part of this program.”
Sensor solution provider, HENSOLDT is expanding its capacity to cater for the growth in its business. HENSOLDT is investing approximately 30 million euros at its Ulm site and creating an additional 300 jobs for highly skilled staff throughout the entire group this year, having taken on 250 new recruits in 2020. New radar for Eurofighters This investment is linked to strong order growth relating to the development of new radar for the Eurofighter combat aircraft and other projects. “In its three years of existence, HENSOLDT has strengthened its position in the global sensor solutions market,” affirmed HENSOLDT’s Chief Executive Officer (CEO), Thomas Müller. Thomas Müller adds, “We operate in the high-tech sensor technology arena, a growing segment characterized by very long-term planning. Accordingly, our investment in new technologies and development laboratories is an indispensable part of our growth strategy.” AI-based sensors AI-based sensors for a wide range of applications will also be developed at the Ulm site The company is investing in the construction of a radio frequency technology development center at the Ulm site, among other things. In addition to electronic components for the new Eurofighter radar, AI-based sensors for a wide range of applications will also be developed at the Ulm site. Last year, the German Parliament approved a budget of approximately 1.5 billion euros for the development of new Eurofighter radar by a development consortium led by HENSOLDT. Other business units of the group are also showing strong growth, such as ground and naval radars, electronic warfare and avionics systems, and optronics equipment. FACS and UAV collision warning system For instance, HENSOLDT is working on future-oriented projects, such as the German/French/Spanish Future Combat Air System (FCAS) and a UAV collision warning system. Recently, in 2020, HENSOLDT already hired 250 new employees, expanded its cleanroom production at its Oberkochen site by 300 sq. meters and converted its radar production in Ulm to series production. The new positions cover many different disciplines, in addition to hardware and software engineers, the company is especially interested in recruiting radar system engineers and project managers.
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Technology Solutions (TSL) UK Ltd, a global provider of radio frequency identification (RFID) handheld readers. TSL designs develop and manufacture ruggedized mobile RFID readers and other multi-technology, mobile device peripherals used to identify and track products and assets. “The acquisition of TSL is a strategic fit for HID, which builds upon our leadership in identification technologies by adding proven handheld RFID readers to our robust portfolio of tags and Internet of Things enablement solutions,” said Björn Lidefelt, CEO of HID Global. “Expanding our RFID components business with TSL readers provides our customers a one-stop-shop for a complete RFID offering of hardware and integration tools - all through a shared distribution channel.” Mobile data capture TSL works with a worldwide network of distributors, OEMs, and system integrators to offer innovative mobile data capture solutions for a variety of applications, such as supply chain management, stock inventory control, and ticketing. The TSL handheld readers are industry-agnostic for use in retail, hospitality, animal ID, waste management, industry and logistics, and any vertical market or application where RFID tags are used. TSL products make it possible for customers to select their mobile device of choice for display and data processing The reader portfolio is focused on RAIN RFID ultra-high frequency (UHF) and also supports high-frequency (HF), low-frequency (LF), barcodes, and QR codes for the broadest range of use cases. With a core competency in designing reader units that are independent of display units, TSL products make it possible for customers to select their mobile device of choice for display and data processing and easily upgrade to new phones and tablets as display devices over time. Mobile operating systems In addition, the range of handheld readers are operating-system-independent; they work with iOS, Android, and Windows phones, and tablets, as well as other Bluetooth-enabled devices. TSL also provides its own mobile apps and a proven, stable, easy to use developer platform with SDKs and APIs that make it easy for third parties to develop across all major mobile operating systems, resulting in hundreds of apps supporting the readers to date. Based in Loughborough, United Kingdom, Technology Solutions was founded in 1994 with a focus on engineering and operations excellence serving Fortune 500 companies around the world. TSL is now a Business Unit within HID’s Identification Technologies Business Area, which is led by Marc Bielmann, Senior Vice President and Head of Identification Technologies.
ASSA ABLOY has acquired Technology Solutions (TSL) in the UK, a global provider of radio frequency identification (RFID) handheld readers. TSL designs, develops and manufactures ruggedized mobile RFID readers and other multi-technology, mobile device peripherals used to identify and track products and assets. "I am very pleased to welcome TSL into the ASSA ABLOY Group. TSL is a strategic technological addition to the ASSA ABLOY Group and reinforces our current RFID offering and provides complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY. Broad RFID portfolio “The acquisition of TSL expands HID’s broad RFID portfolio with proven hardware and integration tools that extend our leadership in identification technologies,” says Björn Lidefelt, Executive Vice President and Head of Global Technologies business unit HID Global. TSL was founded in 1994 and has some 25 employees. The main office is located in Loughborough, UK. Sales in 2020 amounted to about MGBP 3 (approx. MSEK 30) with a good EBIT margin and the acquisition will be accretive to EPS from start.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimeters. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focuses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organization. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localize devices and objects to 10 centimeters of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilized by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
BIRD Aerosystems, the globally renowned developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, has been awarded a new contract by the Czech Republic Air Force. Under the contract, BIRD Aerosystems will provide additional AMPS-MV systems with the patented MACS (Missile Approach Confirmation Sensor) for the Czech Air Force’s Mi-17 fleet. This project is a part of the overall modernization plan of the Czech Mi-17 transport helicopter fleet. AMPS-MV systems with patented MACS BIRD’s AMPS are already operational on the Czech Air Force Mi-17 helicopters and have been successfully deployed in different conflict zones, including Afghanistan. This contract comes after BIRD Aerosystems having conducted an overall upgrade to the Czech’s existing AMPS systems earlier this year, which provided enhanced functionality to the MILDS UV detection sensors and the MCDU Mission computers. As part of the current contract BIRD Aerosystems will provide the Czech Air Force its AMPS systems with the MACS sensor, which ensures that no false alarms will be detected and the system will react only to validated real threats. Ronen Factor, the Co-Chief Executive Officer and Founder of BIRD Aerosystems, said “We appreciate the confidence placed in our AMPS solution by the Czech Air Force, who decided to purchase additional systems for its Mi-17 fleet. Equipped with BIRD’s AMPS-MV solution with the MACS sensor, they can rest assured knowing that their aircraft and crew are safe, even when flying in automatic mode in the most complicated conflict zones.” Airborne Missile Protection System The AMPS system is known to automatically detect, verify, and foil missile attacks BIRD Aerosystems’ Airborne Missile Protection System (AMPS) provides the most enhanced protection for military and civilian aircraft against all known Surface to Air Missiles (SAM), including MANPADS, laser beam rider threats, and radar-guided missiles. The AMPS system is known to automatically detect, verify, and foil missile attacks through the effective use of counter-measure decoys (flares and chaff) that jam the missile’s IR (Infrared) seeker and protect the aircraft. MACS (Missile Approach Confirmation Sensor) MACS (Missile Approach Confirmation Sensor) is an advanced semi-active confirmation radar, which significantly reduces the false alarm rate of the overall missile warning system. Queued by a suspected threat, MACS points towards it and performs a doppler-based interrogation to confirm the existence of a valid threat. By doing so, MACS provides the most effective filtering of all known natural and human-made types of false alarms that are typically detected by electro-optical sensors, and ensures that only real missiles will be declared by the system and reacted upon. Fully operational, BIRD’s AMPS-MV with the MACS sensor is provided as a turn-key solution that includes design, installation, integration, certification and support, and is certified by major aircraft manufacturers.
Access IS, part of HID Global, is delighted to celebrate the successful launch of contactless payments across the Stockholm region by SL (Storstockholms Lokaltrafik). Building on the successful mass deployment of Access-IS ticket readers and validators back in 2019, the latest upgrade to the system sees Access-IS devices in train gates and ticket offices as well as bus mounted validators being upgraded to permit full cEMV contactless payment capability. Contactless ticketing Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read Stockholm is leading the way with this deployment of contactless ticketing across a true multi-modal transit network. Barcode and NFC tickets, as well as bank and credit cards by VISA, Mastercard or American Express are all presented to a single, intuitive-to-use, point of presentation. Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read, meaning passenger throughput is maximized for a great user experience and reduced operational costs. Access IS transit validators and readers Common to many Transit Authorities, SL continues to operate its ‘Accesskort’ proprietary closed loop ticketing scheme in tandem with the new upgrade. However, plans are in place to migrate ‘Accesskort’ to a new SL transit (EMV technology) closed loop card, which will be read/processed on the Access-IS reader, making a single point of presentation for all tickets and payments. All of the Access IS transit validators and readers are non-proprietary, open architecture units, which free the city to use any software backend system they desire. Access IS and SL partnership When Access IS first started to work with Storstockholms Lokaltrafik (SL), it was the beginning of a journey to modernize ticketing across Stockholm. At any ticket reader on buses, metro barriers, commuter trains and boats, rail or tram platform, or with the tram conductor, passengers can now simply tap to make a payment using all major payment schemes, as well as Apple Pay, Samsung Pay, Google Pay via their mobile devices’ digital wallet. A single tap buys them a single trip, priced at SEK 38, the same as the SL app, the ticket machines, or the ‘SL Accesskort’. Initially the system has gone live with adult tickets, but concession tickets for pensioners, students or children will follow. Contactless cards for passengers For passenger security, SL does not see debit card numbers or card account The ticket becomes valid the moment a passenger taps on their contactless card for the first time, at the start of their journey and remains valid for 75 minutes. All of a passenger’s journeys are tallied up and debited as a single payment the following day, making travel payments easy to understand and simple to track for the passenger. For passenger security, SL does not see debit card numbers or card accounts, but uses a technology where the correct card number is exchanged for a random number. This means that SL cannot see which person the payment card is linked to. Deployment of contactless transit payments Speaking about the project, Charlotte Modig, Payments and Cards Senior Business Manager for SL Stockholm said, “As we modernize our ticketing system to be leading edge, the learning curve for all involved is steep. Close cooperation between SL and Access has managed to overcome challenges and deliver a service we are all rightly proud of.” Speaking about the project, Cliff Hunter, Head of Sales for Access IS said, “Our relationship with SL goes from strength to strength with a great deal learnt on all sides during this ‘the largest of its kind’ deployment of contactless transit payments.” Cliff adds, “We champion software agnostic transit products to give operators flexibility in how they implement their mobile ticketing and payment schemes.”
Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-the-art biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a globally recognized company in any high security facility services, anywhere in the world. Enhanced security No high street bank or any safe deposit center can match Sovereign’s credentials and the extraordinary security levels that they have achieved. People across the country have been targeted for their valuables, not only on the streets, but also in their homes. Challenges were to offer a complete peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader). Matrix Access Control solution Matrix Access Control solution is designed to address security concerns in a professional and systematic method Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps in enhancing security, along with barriers and door controllers. Matrix Access Control solution is designed to address security concerns in a professional and systematic method, without compromising on hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card, in order to provide the visitor with access to restricted areas, as per the below criteria: 2-Person rule: This is enforced by requiring the presence of at least two authorized persons Route based access: This allows user to access the authorized route only Anti-pass back: This restricts to enter a secured area second time without first leaving it Result: Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication Boost customer satisfaction Matrix products offered include: COSEC VEGA CAX integrated with turnstile COSEC PVR DOOR CONTROLLER COSEC PANEL LITE COSEC PATH Series COSEC ARC DC100P
The city of Arnhem has chosen Nedap to regulate vehicle flows and to provide a seamless vehicle access experience in its city center. Due to the increase in the number of vehicles in the city center, it was a challenge for Arnhem to ensure that the traffic flow runs smoothly and safely, to keep the historic and tourist center accessible and livable. Vehicle identification solutions With the implementation of Nedap’s vehicle identification solutions, authorized vehicles and drivers can access the city in a safe and seamless way. The combination with Nedap’s MOOV City Access software ensures that vehicle access in the city center easily can be regulated. The city of Arnhem wants to regulate vehicle access to the center and ensure only authorized vehicles can enter The city of Arnhem is located in the east of the Netherlands. Because of the historical center, cultural sights and a wide range of entertainment facilities, it is also an attractive city for tourists. To ensure that the city center remains traffic and pedestrian friendly, the city of Arnhem wants to regulate vehicle access to the center and ensure only authorized vehicles can enter. MOOV City Access platform By limiting traffic flows, the narrow streets in the historic center of Arnhem turned into an attractive and safe public place for pedestrians and cyclists, creating a livable city. The city of Arnhem has chosen Nedap for its MOOV City Access platform combined with its advanced solutions for automatic vehicle identification, based on long-range RFID (Radiofrequency Identification) and ANPR (Automatic Number Plate Recognition) technology. Authorized vehicle access in specific zones The solution is supplied and installed by Nedap’s partner - ST&D. Nedap’s MOOV City Access platform is implemented to control vehicle access in specific zones. With this, Arnhem ensures that only authorized vehicles can enter these zones and only if they have permission to do so. With the implementation of RFID readers and ANPR cameras, vehicles can be identified from a long distance, ensuring automated and safe vehicle throughput. Nedap’s long-range RFID solution, TRANSIT will be used to ensure that local residents, emergency vehicles, licensed taxis and municipal services have easy access to the city center, without compromising on safety. TRANSIT long-range RFID solution Authorized vehicles equipped with a RFID tag will have fast access at vehicle entrances TRANSIT is a proven technology that enables highly secure identification and tracking of vehicles and drivers, up to a distance of 10 meters. Authorized vehicles equipped with a RFID tag will have fast access at vehicle entrances, without the need to stop. The all-in-one license plate camera, ANPR Lumo will grant access to vehicles based on their license plate number. License plate recognition is a perfect solution for specific user groups or situations, in which vehicles require access temporarily or incidentally to the city center. For example, retail delivery trucks can be given access at pre-defined locations, assigned days and time zones, regulating vehicle access to the city by reason. Digitization of city access “By choosing and implementing Nedap’s MOOV City Access platform in combination with Nedap’s license plate recognition solution, we have taken a major step in the further digitization of our city access in Arnhem,” said Hans ten Barge, Chain Director Parking at the Municipality of Arnhem. Nedap Identification Systems is a specialist in Automatic Vehicle Identification and Vehicle Access Control solutions, for over the past decades. Nedap has developed a unique portfolio of proven long-range RFID and ANPR solutions that enable seamless third-party system integration. Vehicles and drivers are identified automatically, securing a free-flow yet highly secure vehicle access experience. MOOV City Access is Nedap’s vehicle access control solution, specifically designed for regulating vehicle flows in inner cities. MOOV’s hardware and software are compatible with Nedap’s RFID readers and ANPR cameras. This complete solution ensures a livable and safe city.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fueled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralized access control systems Almabani General Contractors was using traditional decentralized access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognized in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralized, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customized reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralized solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customized with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralized time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
Slovakian integrator, RYS, has recently deployed a system that provides a textbook example of how RFID access control can concretely improve people’s lives every day. Before automatic access control was introduced there, a Bratislava apartment building, known as ‘The Pentagon’, had suffered a reputation as a place to avoid. RFID access control system Drug dealers, vandals, and a similar criminal element were a chronic presence, leaving residents constantly feeling unsafe in their own homes. Idesco customer RYS was contracted to design and deploy an RFID access control system to better guarantee safety and enhance the residents’ quality of life. With over 30 years specialized experience in residential building access control, RYS designed a solution and chose Idesco to supply the over 100 RFID readers to be deployed. Currently, those readers control both ground floor access and section/hallway entrances on each floor. Elevator readers restrict residents’ access to their own floors. Access to only RFID tag-holding residents The system even restricts access to the building’s waste bins, ensuring their use only by its RFID tag-holding residents. Simultaneously, the entire system collects real time data about access events, including unclosed doors or unauthorized access attempts, to help strengthen prevention and control. Due to the building’s history of vandalism, RYS recognized the importance of choosing readers capable of withstanding malicious impacts, moisture and dust. Idesco optical tamper Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers" Marcela Benuskova, RYS Assistant Project Manager, commented “Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers. Whereas alarms should be sent whenever a reader is intentionally mishandled, mechanical tampers trigger false alarms more often than those cued optically.” Marcela continues, “The technical solutions Idesco and RYS implemented, combined with the efforts of an excellent crisis management team, triggered almost unbelievable changes inside that apartment building. Our access control not only strengthened crime prevention immediately, but also empowered law enforcement in discouraging unwanted or illegal activity.” Enhanced building security He adds, “As that building’s security increased, the market value of individual flats began trending upward. Today, the building’s residents feel safer and they have actually started thinking positively about their community’s future.” Marcela Benuskova with RYS closed by stating, “Idesco’s team is so nice to work with; they always respond fast, with a friendly, professional and positive attitude. Any technical question or problem gets looked at, given proper thought and action. They have always been open to, and repeatedly implemented, product changes we asked for.”
Radio frequency Identification: Manufacturers & Suppliers
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload