Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network acce...
Quantum Corp. announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The offerings include a new line of network video recording servers, and a new line of servers for building management systems and GPU-based video analytics. In addition, Quantum added new capabilities for the VS-HCI Series which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video ma...
Given the current outbreak of COVID-19 and the impact the virus is having on global communities, customers, employees and families, AAEON would like to share their business continuity plans, and how they can help. Operation as Usual All AAEON facilities and functions are running as usual. The manufacturing sites in AAEON Taiwan and China are at full operation. The Supply Chain Management, FAE, RMA, and Logistic Center in AAEON Europe Netherlands remains working without disturbance. All AAEON E...
For customers who service banks, Digital Monitoring Products, Inc. (DMP) offers an affordable way to bring ATM vestibule access control to their facilities. Digital Monitoring Products’ new 734B Bin Code Access Control Module installs just like any of the company’s access control modules. And like all DMP access control solutions, it's designed with customized functionality and added flexibility. 734B Bin Code Access Module 734B allows banks to restrict access into their ATM vestib...
St Albans based Sandringham School has recently spent nearly £8m in new build and renovation of existing accommodation to create a world class learning campus. As an outstanding rated school, its aim is to become a world class educational facility where students receive the best possible education. Amthal partners Sandringham school to maintain its high profile intruder alarm systems and secure the entire campus site. Former pupil Luke Allam, is now responsible for his old school to carry...
Adder Technology, a global provider of connectivity solutions and high performance IP KVM, has announced the launch of the new ADDERView Secure Range of KVM switches and accessories. The NIAP Protection Profile 4.0 compliant range is designed to minimize hacking and cyber-attack risks without compromising real-time data visualization and secure collaboration in mission-critical environments. Made in America, the range of secure switches combine features such as channel separation, uni-direction...
HID Global, a worldwide provider of trusted identity solutions, announced the launch of HID® Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today’s dynamic environments and set organizations up for smarter, more connected access control. Access control systems “With the industry now seeking to use access control systems as a backbone for creating intelligent environments, consultants, integrators and end users are increasingly demanding more versatile, high performance solutions,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions, HID Global. Organizations can use their technology of choice and easily migrate to the latest solutions “HID Signo is built on an open platform and delivers on our commitment to innovation with its unprecedented flexibility and robust set of forward-looking features that optimize workplace experiences. Our goal is to put more choices in the hands of our customers and give them peace of mind in knowing they can continually adapt their systems as requirements change.” Physical and mobile credential technologies For ultimate versatility, the readers are interoperable with over a dozen physical and mobile credential technologies so organizations can use their technology of choice and easily migrate to the latest solutions at their own pace. Additionally, with support for Apple's Enhanced Contactless Polling (ECP) to enable Student IDs in Apple Wallet, HID Signo is driving the next wave of flexibility and convenience with mobile access. HID’s new readers are packed with smart features, such as automatic surface detection that recalibrates and optimizes read performance based on the mounting location. For rugged, outdoor performance, the readers are also IP65 rated with no additional gasket needed, and feature a capacitive touch keypad resistant to harsh weather conditions. Remotely configure and diagnose readers HID Signo’s connectivity-by-design model empowers administrators to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. Additionally, configuration can be further streamlined through the controller via the Open Supervised Device Protocol (OSDP). HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems" “HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems that will enable new applications and innovative capabilities, such the ability to proactively anticipate and address system issues before they occur,” Radstaak added. Built-in support for OSDP Secure Channel Delivering multi-layered security with built-in support for OSDP Secure Channel and HID’s proven Security Identity Object technology, the readers store cryptographic keys on certified EAL6+ secure element hardware and custom authentication keys can be used to further enhance security. HID’s patented velocity-checking feature also protects against brute force rapid electronic attacks. The new line of HID Signo Readers is available through Advantage Partners in major markets worldwide, with a phased roll out in select regions.
3DX-Ray Ltd will be exhibiting their ThreatScan LS1 and LS3 X-Ray scanning systems at the forthcoming Security and Policing Home Office Event in Farnborough, UK from 3 to 5 March 2020 Designed for rapid deployment and ease of use, ThreatScan systems operate with the intuitive and user-friendly ThreatSpect software to produce high quality, sub-millimetre resolution images. ThreatScan X-ray scanning systems ThreatScan- LS1 is a lightweight, thin, portable and battery-powered large format x-ray scanning system. It has a large 600mm x 460mm imaging area that enables typical bags and packages to be scanned in one scan. It can penetrate up to 34mm of steel at 120kV and still produce high quality, sub-millimetre resolution images. ThreatScan- LS3 is a compact, yet powerful x-ray scanning system that can penetrate 34mm steel at 120kV as standard. The 305mm x 256mm imaging area enables typical bags and packages to be scanned in one scan. The complete system fits securely into a backpack, ideal for operations in remote locations. One can find 3DX-Ray on Stand No F22 at Security and Policing 2020.
Vanderbilt is pleased to announce a new partnership with Dutch-based company, Logitime International. Logitime provides a complete and integrated solution for access control, time and attendance, and shop floor data collection. The Vanderbilt partnership centers around the integration of Vanderbilt’s VR40 OSDP Readers with Logitime’s Time and Attendance (T&A), Access Control, and Shop Floor Data Collection software solution. Logitime’s T&A software Logitime solutions' primary function is to deliver a fully customizable and interactive access control product to their customers. As such, Vanderbilt’s VR40 Readers, which are supported by OSDP, fit perfectly into this customer-first model. Using Logitime as a solution, the company in question was able to customize their access control Logitime’s T&A software is designed to be a fully integrated program. This enables Logitime to provide a tailored solution for each unique customer. An applied example of this is how Logitime’s software solved a business’ office car park problems. The car park was located near a commercial shopping center. Often employees would use the car park on their time off to go shopping. This led to employees who were scheduled to work, not being able to find parking due to the limited places available in the parking lot. Vanderbilt’s VR40 Readers Using Logitime as a solution, the company in question was able to customize their access control. Access to the parking lot was granted using the T&A work schedules instead of fixed access profiles. An incidental change of shift, an irregular shift pattern, or planned absences like holidays had a direct effect on the access control rights. Vanderbilt’s VR40 Readers fit into this mix by complementing Logitime’s goal of being interactive and customizable. This is because the VR40 Readers come with a display screen that allows Logitime to integrate and customize the messaging being displayed to their intended audiences on a customer-by-customer basis. Suitable for highly technological environments Speaking on the integration, Alexandre Prinsen, Senior Consultant at Logitime, explains: “At Logitime, our interactive technology is a crucial component for us. Therefore, being able to work with Vanderbilt’s VR40 OSDP Readers and customize our messaging in their display screens is, of course, an excellent match for us. Using the VR40 Readers, Logitime’s software can deny access to un-credentialed users “With our software solutions, we’re always thinking about solutions, and we want to be focused on being a customer-first company. You can calculate anything in our software and the VR40 Readers are a great gateway to communicate these customizable messages to the end user within one-tenth of a second. “The Vanderbilt VR Readers are very suitable for highly technological environments that need or want the feedback within their access control systems. We can even use them as T&A readers,” Prinsen concludes. High-risk security zone For example, take a high-risk security zone. If using the VR40 Readers, Logitime’s software can deny access to un-credentialed users and explain to them the reason why through the VR40 display screen with messages such as, “High-security zone – safety training needs renewal,” or “Credential needs to be validated - not allowed into high-risk area.” This is just one example of the endless applications possible. Multiple access control functionalities require interactive feedback such as: “Maximum pin code attempts,” “Anti-pass back,” “Security guards random search required,” “Maximum amount of people allowed in the area,” “Remote access granted,” etc.VR40 readers have three indicator LEDs and a multi-tone buzzer for audio verification" OLED display to simplify installation Commenting on the partnership from Vanderbilt was Nick Pegtol, Country Manager for Benelux at the company. “As well as being attractive and robust, Vanderbilt's VR40 OSDP Readers introduce dynamic features and an OLED display to simplify installation and in-service functionality. “Our VR40 readers have three indicator LEDs and a multi-tone buzzer for audio verification. A multi-color light frame enforces access status information. This can be configured to follow the indicator LEDs or any number of different options. Display brilliance is set automatically by an inbuilt light sensor. “Aesthetics aside, one of the key features of our VR40 Readers is the inclusion of the highly secure OSDP (Open Supervised Device Protocol) to help combat people hacking communications. OSDP ensures that sniffing devices cannot be installed behind the reader or along the communications path, which we also believe strongly aligns with Logitime’s goal of producing customer-oriented solutions,” Pegtol summarizes.
Mobile security provider Trustonic announces that it has joined the Car Connectivity Consortium (CCC) to contribute to the development of technical specifications for secure connected car technologies. The CCC is a cross-industry organization advancing global technologies for smartphone-to-car connectivity solutions. Key-sharing smartphone apps Its current priorities include Digital Key, an exciting new open standard to allow smart devices to act as a vehicle key, and Car Data which will connect consumers to service providers offering tailored services enhanced by vehicle data, such as pay-how-you-drive insurance, road monitoring, and fleet management. Trustonic will contribute to the further development of the Digital Key specification, offering its significant experience of working with automakers and Tier 1 vendors. In the past year, the company has announced that Volkswagen Group and Hyundai are using the Trustonic Application Protection (TAP) platform to secure their digital key and key-sharing smartphone apps. Secure smart mobility applications Dan Rawlings, CCO, Trustonic, says: “Connected car innovations like digital keys are hugely exciting. They deliver convenience to consumers, reduce costs for automotive manufacturers, and enable new and innovative smart mobility use-cases, including remote key sharing, car club and vehicle sharing schemes, autonomous parking and geofencing services. The risk of malicious hacking or malware attacks, including the possibility of vehicle theft, however, have serious ramifications." “That’s why we’re working with the CCC and leading car manufacturers and Tier 1 vendors to deliver secure smart mobility applications, using advanced in-app protection and the strongest user authentication available today.”
KBC Networks will be present at ISC West 2020 with their industrial transmission and remote power solutions on booth 29093 from March 17th – 20th. Well known in the industry for their trusted fiber transmission solutions, KBC will highlight their broad range of fiber products, including their direct replacements for the discontinued IFS and Fiber Options legacy products. KBC’s fiber optic range offers multimode and singlemode solutions for static and PTZ cameras; industrial data systems including RS-485, 232 and 422 telemetry; single and multi-channel contact closure and Ethernet media conversion including Power over Ethernet. Digitally encoded video transmission Both the Mobile and Fixed Base Surveillance Systems are fully compatible with KBC industrial transmission products Solutions include simple point-to-point transmission links, self-healing ring, daisy chain and BUS to custom-build, multi-interface modems with provision for up to 128 real-time video signals plus other signals over a single fiber. The range supports video, audio, data, Ethernet, telephone, contact closure, DVI, HD-SDI, 3G-SDI and USB, and features 8- or 10-bit digitally encoded video transmission. Designed for faster installation and to maximize product density, KBC fiber products are available in compact, wall-mount, DIN rail, 19” rack and cards for 3U or 4U chassis. Built to perform in non-conditioned environments, they are housed in industrially hardened casings and have extended operating temperatures. Mobile Surveillance Systems Also on display this year will be the newest Mobile Surveillance Systems (MSS). After successfully introducing the MSS at ISC West last year, KBC will debut a fixed base unit available for stand-alone design or multiple unit installations. This custom configured solution is ideal for applications requiring semi-permanent or mid to long term video, audio and data security. Both the Mobile and Fixed Base Surveillance Systems are fully compatible with KBC industrial transmission products, including the gigabit wireless and ThruLinkTM hardware-based VPN device.
Boon Edam Inc., a globally renowned security entrances and architectural revolving doors provider, has announced that they are introducing a new optical turnstile, the Speedlane Compact, in a world premiere, in booth #8037 at the ISC West exhibition in Las Vegas on March 18-20, 2020. ISC West is the international largest security event in North America bringing together close to 30,000 participants for networking, education and discovery of new technology. In addition to showcasing this newest member of their premium optical turnstiles, the company will also be showcasing fully integrated solutions that address physical perimeter security and control pedestrian access. Boon Edam is also the official turnstile sponsor of the show. Integrated Technologies for Tailgating Mitigation Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with the appropriate entrance solution. Swinging doors do not stop authorized people from holding the door and letting in others. Security entrances coupled with access technologies provide a complete solution that ensures only one person can enter per valid authorization. The following solutions will be on display in Boon Edam’s booth: NEW Speedlane Compact Optical Turnstile: Following the enormous success in the high-end speed gate market with the top-selling Lifeline Series, the development began to fill the market need for a premium quality, mid-range product. Thus, the Speedlane Compact was created, a swinging barrier turnstile that offers easy installation and integration with access technology and attractive delivery turnaround times. “With this new product, we have a solution that fits in everywhere – both in dimensions and design, without compromising on safety, security or quality,” said Mark de Jong, Product Manager of the Security Products Portfolio. Lifeline Speedlane Swing Optical Turnstile: There will be two, sleek Speedlane Swing turnstiles in the booth featuring unique identity recognition technologies to demonstrate efficient and secure throughput. One Speedlane Swing will feature a custom, integrated pedestal that incorporates the MorphoWave Compact touchless fingerprint technology from IDEMIA. The patented touchless sensor technology scans four fingers in 3D in less than one second, ensuring the most accurate and reliable fingerprint matching for maximum security. The second Speedlane Swing will feature AnyVision facial recognition technology with enhanced AI capabilities. Lifeline Boost Access Control Pedestal: The Boost is a stylish pedestal designed by Boon Edam to complement the popular Lifeline optical turnstile series and house virtually any access technology inside. The Boost will include the latest version of Essex’s credential card reader, the iRox-T, which now features Bluetooth and OSDP capabilities that expand HID Global’s Mobile Access solutions. Tourlock 180+90 Security Revolving Door: The entrance of choice for the Fortune 500, the Tourlock provides the highest level of throughput (up to 42 people per minute in two directions) while preventing unauthorized entry. The Tourlock in the booth will include StereoVision piggybacking detection technology and an AMAG Symmetry card reader to demonstrate the combination of fast throughput with high perimeter security. Circlelock Security Mantrap Portal: Offering the highest level of security available in an entrance using StereoVision piggybacking detection technology, the Circlelock security portal prevents intrusion into the most sensitive locations such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, while facial recognition technology provides instant authentication inside the portal: the secure, edge-based facial recognition access control device by Alcatraz AI, called the Rock, ensures only the right person can enter. BoonConnect Software: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Tailgating Prize Giveaway Boon Edam was confirmed as the global company in Pedestrian Security Entrances in the Americas according to a report by IHS Markit covering the 2016-2018 timeframe. To celebrate almost a decade of leadership, there will be a tailgating-themed prize giveaway in the booth.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realized in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorized party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realized) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorize monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security marketSmart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognizable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Security isn’t easy for schools and universities. As education institutions increasingly become vulnerable targets for threats and attacks, they face the security challenges of maintaining a welcoming and open environment while ensuring the comprehensive safety of the students, teachers and staff. The balance between providing high levels of security with a certain level of convenience becomes crucial, especially when considering the large audience schools work with – the staff, administrators, students, parents and other organizations that utilize the facilities. In addition, schools are budget-conscious and must use their resources wisely. School administrators are often contacted repeatedly by organisations with multiple safety and security products The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products. PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. Data capture form to appear here! Ensuring procedures evolve There is no guarantee that what works to increase safety and security today will also work tomorrow. Because potential threats to safety and security can and do change, it is important that whatever policies, procedures and technology a school implements today can also evolve to address those changes well into the future. It is also important that schools take into account the need to distinguish among a wide variety of possible situations to ensure the appropriate people are notified and correct procedures followed. For example, the response to an active shooter situation is going to be very different from the response to a fight that occurs in a hallway. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, vice president of Facility Engineering Associates, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but says that value is almost completely realized in terms of forensics – reacting after an incident rather than during or before. A second priority for school security is controlling access to the building Communications, specifically mass notification systems, are an important tool for school security, says Timm. Mass notification must be able to provide emergency information to people in the gymnasium, or on a field trip. A second priority for school security is controlling access to the building. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors. But a video intercom works best in conjunction with other complementary products including remote-controlled locks that allow staff to admit visitors while safely sitting behind locked doors. The object of any solution is to eliminate or delay entry of an assailant long enough for police to respond and for school administrators to communicate with teachers and campus staff so they can lock down their classrooms or evacuate, depending on the situation.
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
Pulse Secure, globally renowned provider of software-defined Secure Access solutions, has announced the delivery of a successful project at Warrington Borough Council (WBC), designed to help deliver taxpayer value and workforce flexibility through Secure Network Access. Warrington Borough Council is a unitary authority in the north west of England serving approximately 200,000 citizens across 22 wards. WBC provides a full range of local government services including council tax billing, libraries, social services, the processing of planning applications, waste collection and disposal and more, that are delivered through its own staff and third-party partners supporting council operations. This approach makes remote access to relevant areas of the network increasingly important for communication and productivity. Juniper VPN technology and RSA two-factor authentication WBC’s existing Juniper VPN technology and RSA two-factor authentication were up for replacement, prompting the council to put out a tender invitation for vendors to propose new technology to deliver secure, selective access to its network for third party associates. The tender required a secure access platform that could initially support 100 licenses, with the potential to scale to meet changing demand while offering easy ongoing management. WBC objectively tested the proposed solution before selecting Pulse Secure as the best fit for its needs with DXC, a Pulse Secure Elite partner selected as the solution provider including a three-year contract with built-in software and service support. Reliable, secure VPN access DXC team transitioned the council’s network from Juniper SAs to Pulse PSAs in on-site implementation project The DXC team seamlessly transitioned the council’s network from Juniper SAs to Pulse PSAs in a two-day, on-site implementation project with minimal interruption to user services. Now, the council can provide reliable and secure VPN access for its entire direct and indirect workforce, making remote and mobile working easier. “[I was] really impressed with how DXC were able to implement our remote access solution, no impact to our customers, and no complaints either,” said David Gallear, Technical Lead (Network), Resources and Strategic Commissioning Directorate at Warrington Borough Council. Remote and mobile access The council has gained a fully secure network and can grant selective access to third party partners as needed, with simple ongoing management keeping costs low. Giving third-party associates remote and mobile access has also helped the council to promote a better work/life balance for its entire workforce. The new solution also helps WBC provide a more responsive, streamlined and efficient service to customers. With secure remote access, productivity has remained high even during bad weather or travel disruption that would previously prevent staff from coming into the office.
TCIEXPRESS, a customer-oriented, multi-technology transport system in the Indian and International markets, has announced using Matrix Time-Attendance solution for increasing productivity and streamlining salary processing. This high-tech transport system pursuit value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world. TCIEXPRESS multi-technology transport system TCIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts and leave policies for the various locations and numerous workers at a central place was a very tedious task for them. Moreover, this leads to complex computation for salary based on the absent-present report. So, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. Ultimately, they were facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for Time-Attendance and payment process. Matrix offered COSEC VYOM for people mobility management for TCIEXPRESS's 3000 employees at 500 locations COSEC VYOM cloud-based system After a comprehensive discussion regarding problems and requirements, Matrix has offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based Time-Attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix Time-Attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS. COSEC VYOM cloud-enabled Time-Attendance system provides the following results - Quick salary processing Improves productivity Reduce paperwork Secure and on-demand network access Eliminates server cost, infrastructure cost, and maintenance cost Products Offered: COSEC DOOR FOT
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organizations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data center applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organization of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cybersecurity training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernized platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
Globally renowned electronic locks manufacturer, Mul-T-Lock has announced providing Glenveagh National Park in County Donegal, Ireland with over 50 of its high-tech eCLIQ locks so as to enable them to efficiently manage access control rights across the whole estate. Spanning over 170 square kilometers in area size, Glenveagh National Park is the second largest national park in Ireland. It features a number of rugged mountains, pristine lakes, tumbling waterfalls and enchanted native oak woodlands that together make up its ecosystem. At the center of the national park, on the edge of Lough Veagh, is Glenveagh Castle, a late 19th century castellated mansion, which was originally built as a hunting lodge. Advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock eCLIQ locking system With multiple facilities located on the sprawling site, Glenveagh National Park required a high-security and fully customizable access control solution, and therefore opted for Mul-T-Lock’s advanced eCLIQ locking system. The new and advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock, subsequently granting and revoking access to various areas of the estate whenever necessary. Remote access control solution Stephen Crowe, Regional Sales Manager for Mul-T-Lock, commented, “At Glenveagh National Park there is a need to restrict public access from certain areas for safety reasons, but at the same time, relevant staff should be able to access these areas whenever required”. He adds, “Our eCLIQ system proved the perfect solution for this, as administrators (those who manage the security system) can easily set-up tailored access permissions remotely via our CLIQ Remote Web Manager software. eCLIQ padlocks and cylinders Stephen further stated, “With eCLIQ, administrators also have the ability to set time-limited access – something that isn’t achievable with a mechanical system. For example, padlocks around the estate could be programmed to allow access to certain gates between Monday and Friday, from 8am to 6pm. It’s this customization that makes our system so popular.” The Mul-T-Lock system was specified and installed by Paul Speer at JP Speer Locksmiths, who added, “We now have over 50 eCLIQ padlocks and cylinders securing gates, offices and the Visitor Center within this impressive estate. The complete system is managed from the main office and once set up it is easily maintained, with the flexibility to change quickly whenever required.” Mul-T-Lock advanced eCLIQ technology Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed" Paul further said, “Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed. Glenveagh National Park has used mechanical systems in the past, but these haven’t been able to satisfy its access control requirements. Mul-T-Lock’s eCLIQ technology ensures that access rights are maintained for years to come.” Pat Vaughan, District Conservation Officer at Glenveagh National Park, finished by saying, “Mul-T-Lock’s eCLIQ system is the perfect fit for our Park as it has all the features that such a vast estate as ours requires. Park security He says, “During our summer season our visitor numbers quadruple and we have to employ seasonal staff to meet this demand. Having such a system as Mul-T-Lock’s eCLIQ means that we can set up temporary access for these workers, with all the relevant access rights required. The eCLIQ system also enables us to deactivate keys and revoke access at the click of a button.” Pat adds, “This is particularly helpful if any of our team accidently lose their keys, or if temporary staff forget to return keys after their time with us. We are extremely happy that we opted for the eCLIQ system to secure our beautiful estate; it will stand the test of time for years to come and has all the features we require to manage, build and secure our Park and its future.”
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals