Videx, globally renowned manufacturer and supplier of access control and door entry systems, has strengthened its presence in the international access market by launching a new web server access control system, WS4. WS4 web server access control The WS4 web server access control system can manage up to 20 entrances locally or remotely from anywhere via a mobile phone, tablet or PC using a web browser to connect to the system. Additionally an app is available for both iOS and Android. Th...
Johnson Controls has announced the release of its new product offering, EntraPass v8.20 which will further simplifies how users remotely access the EntraPass go Mobile App. EntraPass v8.20 With EntraPass v8.20, EntraPass go Pass Mobile App users gain improved search capabilities and other efficient upgrades to deliver a remote and real-time access control solution. EntraPass go Pass requests will no longer be attached to a selected SmartLink, eliminating the need to configure every conne...
Allegion, a provider of security products and solutions, and CBORD, a provider of campus card technology solutions, announced a new integration that strengthens perimeter security across colleges and universities in the U.S. Allegion’s Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options will now extend the impact of CBORD’s card software system for greater control of secondary doors over perimeter access. The integration improves perimeter security by providing elect...
So many business processes are controlled, tracked, measured or monitored by software. So, it’s frustrating when multiple systems create double or triple the work. Unfortunately, not all of a user's software plays nice together. Web-enabled software for a CLIQ key-based access control system is an exception. No matter what the user’s business, the CLIQ Web Manager helps the user manage their access control quickly and efficiently. Now the user can also integrate their powerful acces...
Pulse Secure, global provider of software-defined Secure Access solutions, has announced a new distribution partnership with Cloud Distribution to grow its channel community across the UK and Ireland to meet accelerating demand for Zero Trust access security. Cloud Distribution is a “Cloud First” next-generation value added distributor (VAD) and specialist in Cyber Security, Networking, and Data Center Solutions with a community of over 900 active partners across the UK and Ireland....
Texecom Cloud is delighted to announce that they were awarded ‘Technological Innovation of the Year’ in the recent PSI Premier Awards. Accessible on any internet-connected device, Texecom Cloud enables security installers to manage multiple alarm systems from one simple interface, simultaneously. This in turn helps them save money and increase revenues by being more efficient and adding value to their customers. It gives engineers complete control over their alarm system portfolio &...
PAC & GDX, global provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has made it possible for smartphones to be used as an access control identification tool, thereby providing the highest level of convenience, flexibility and ease of operation. Integrating radio frequency identification technology PAC & GDX offers a lifetime warranty for all Architect readers on account of their quality In addition, PAC & GDX is so confident in the production quality of these products that it is offering a lifetime warranty for all Architect readers. Offering unrivalled levels of modular scalability, Architect can be configured to suit every application – from a single door to a fully integrated global internet based system – and the range currently comprises two variants. Architect-A readers The ‘Architect-A’ is a compact sized reader, while the ‘Architect-One’ is a Mullion reader, which is specially designed for installation in small spaces. Both variants are available in two options, either with RFID only or with Bluetooth & RFID. “In modern workplaces the vast majority of employees have smartphones, so utilizing these devices for access control purposes makes perfect sense,” explained Pete England, Global Product Manager for PAC & GDX. Mobile access He adds, “Put simply, people don’t want to be carrying multiple keys and tokens around when their smartphones can do the same job. Architect is the only solution that provides secure identification modes without the constraint of having to swipe a card.” An access control system needs to perfectly meet the requirements of the environment in which it is installed, and Architect offers five identification modes for a unique user experience. Remote access and control Card Mode allows a smartphone to be used as a classic badge, while Slide Mode makes a user’s hand a card Card Mode allows a smartphone to be used as a classic badge, Slide Mode makes a user’s hand a card, and with Tap-Tap Mode a user taps their smartphone twice and a Bluetooth signal is sent to the reader to unlock. Remote Mode allows a smartphone to be used as a remote control and, last but not least, Hands-Free Mode means a user can simply walk past a reader. In light of the General Data Protection Regulation (GDPR) organizations must do all they can to avoid unauthorized access to personal information. When using an Architect reader, PAC & GDX ensures the process is highly secure thanks to the implementation of encrypted SQL databases and an EAL5+ crypto processor. Security key management AES 256-bit SSL encryption is also employed at server level – the same grade used by banks and hospitals – while master key databases are not stored but regenerated and authenticated after each use. This means that there is no transit of personal data when using Architect. Designed to be used in a wide variety of environments and applications, Architect readers have a rugged design that makes them weather resistant, chemical resistant and able to self-extinguish in a fire. They are also vandal resistant to IK10, which means that they are protected against 20J of impact. This is equivalent to the impact of a 5kg mass dropped from 400mm above a surface. Advanced access control technology With growing demand for access control technology that is intuitive, flexible and secure, products also need to be environmentally friendly. This was an important factor for PAC & GDX when deciding to launch the Architect range and so the entire unit is recyclable, as no resin is used.Using smartphones credentials reduces the need for physical tokens, which reduces inventory, logistical and transport costs Furthermore, the use of smartphones as credentials reduces the need for physical tokens, which reduces inventory, as well as logistic and transport costs. This is not at the expense of style though and bespoke fascia designs are available to complement an organization’s corporate profile. Smartphone access control solution “PAC & GDX is driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” said Pete England, further adding “Smartphones offer new possibilities and it is estimated that over 20 per cent of people within organizations will be using them for access control by 2022.” Pete concluded, “It’s why we have launched the Architect range, which combines convenience, flexibility, operational ease and efficiency, high levels of security, modular scalability and a vandal-proof design. Anyone with a traditional physical based token and reader system that wants to embrace newer technologies now has the perfect solution within reach.”
Larson Electronics, a Texas-based company with over 40 years of experience spearheading the industrial lighting and equipment sectors, announced the release of an explosion proof network IP camera designed for observation in hazardous locations. This camera is explosion proof, dust proof, ignition proof, weatherproof and tamper resistant providing operators with a live feed from inside tanks, reactors, vessels and more. This camera comes with built-in infrared and a 3-port junction box. Explosion proof network IP camera The EXPCMR-IP-POE-4MP-IR-FLX.23-JB.3.SFC explosion proof network IP camera is rated for use in Class I, Divisions 1 and 2, Groups B, C and D; Class I, Zones 1 and 2, Groups IIB+H2 and IIA; Class II, Divisions 1 and 2, Groups E, F and G; Class III, Divisions 1 and 2 hazardous locations. This camera features a built-in 1/3” progressive-scan CMOS image sensor that delivers up to 4.0MP resolution at 20 fps. This camera features a wide-angle lens with an 83-degree field of view to cover large areas. Built-in infrared This camera uses a true day/night IR-cut filter removal to produce clear images in low light conditions Larson Electronics’ explosion proof network IP camera comes with built-in infrared and utilizes 120dB true wide dynamic range and 3D digital noise reduction. This camera uses a true day/night IR-cut filter removal to produce clear images in low light conditions and automatically switches from full colour to IR mode when visible light falls below a certain level. Camera link-up is achieved via a customer-provided RJ45 ethernet cable that is run back to a customer-provided DVR system. To record the stream from the camera a network video recorder (NVR) is required, but live-view is capable without any NVR system via remote access to the camera. A main stream and two sub streams are available for live viewing and each can be configured to different resolutions and frame rates. This camera can be mounted to ceilings and other surfaces or around corners from conduit runs. This unit’s flex coupler is terminated inside an included explosion proof 3-port junction box. This unit comes with one pack of 3/4" EYM seal off and chico/fiber compound mixture for sealing the camera side of the flex coupler. Suitable applications include vessel, tank and reactor monitoring, remote observation of external facilities and more.
Kwikset® brand of Spectrum Brands, Inc. – hardware & home improvement division, the pioneer in residential security, introduces Control4® compatibility to its Obsidian™ Electronic Touchscreen Deadbolt with Home Connect™ and the contemporary version of the SmartCode™ 916 Touchscreen Electronic Deadbolt. The new locks were shown at the Control4 booth (#3013) at CEDIA 2019 in Denver. In response to increased dealer demand for Control4 compatibility, two of Kwikset’s most popular connected locks have passed Control4 certification and are now recognized as a partner in the connects with Control4 program. Third-Party consumer electronics products The Control4 platform, interoperates with more than 14,000 third-party consumer electronics products Besides the high level of security and convenience they provide, these new locks give customers and smart home professionals additional design choices to compliment today’s home aesthetics. The Control4 platform, which operates on the ZigBee protocol, interoperates with more than 14,000 third-party consumer electronics products. “Our philosophy has always been to create a lock for everyone, whether in terms of style, finish, functionality, or operating platform,” said Nick English, Kwikset’s North American Sales Manager, Residential Access Solutions. “There’s no question that the Control4 audience is growing by leaps and bounds. As a result, we felt it would be a sound business decision to create these new smart locks to help Control4 homeowners take advantage of the amazing functionality of two of our most popular locks, as well as their own Control4 home automation systems.” Advanced mechanical and electronic security features Both Connects with Control4 Certified locks are available in Iron Black and Satin Nickel finishes. The Iron Black finish represents the Kwikset’s first locks in the Control4 channel available in black – a finish that has long been requested by Control4 customers. The new devices bring Control4 dealers and homeowners the full range of features Kwikset built into these two smart locks. Named after a dark, glasslike volcanic rock, Obsidianmerges a sleek and modern exterior; a class-leading, minimal, all-metal interior; and advanced mechanical and electronic security features. Eliminating the keyway also removes the threat of ‘lock picking’ and ‘lock bumping,’ and attacks using specially cut keys to defeat conventional pin and tumbler locks. Capacitive touchscreen for keyless entry Kwikset’s first keywayless deadbolt, Obsidian features a responsive, capacitive touchscreen for keyless entry. The cool white LED display delivers crisp, high-definition LED illumination, and a dedicated lock button provides the homeowner with convenient and fast one-touch locking. The contemporary SmartCode 916 smart locks features an updated, modern design Obsidian also includes Kwikset’s patented SecureScreen™ technology, an important feature that can help mask ‘smudge’ attacks, in which passcodes can potentially be jeopardised by detecting frequently used numbers from the oily residues on the touchscreen surface. The contemporary SmartCode 916 smart locks features an updated, modern design – a contrast to the traditional style already available to Control4 homeowners. Home security and automation systems The lock integrates with home security and automation systems to deliver convenience and peace of mind to homeowners with complete remote locking/unlocking via smartphones and tablets. It also offers Kwikset’s popular SecureScreen feature. In addition, the SmartCode 916 offers SmartKey™ Re-Key Technology, which allows homeowners to re-key the lock in seconds without removing the lock from the door or requiring the services of a locksmith. MSRP for the Obsidian is $418 USD and the contemporary SmartCode 916 is $399 USD. Both smart locks are available for purchase through Control4 certified dealers.
Johnson Controls will exhibit security technologies and platforms that are helping to advance the safety, comfort and intelligence of spaces in order to power the mission of its customers at Global Security Exchange (GSX) in Chicago from Sept. 8 through Sept. 12. In booth #703, Johnson Controls will showcase innovative technologies that work together to construct connected, intelligent facilities in an “Integrated Smart Buildings Command Center.” Attendees will have an inside look into Johnson Controls integrated security, building controls, and life safety offerings that help to create safer, smarter and more sustainable environments. Create smarter, more integrated buildings “As we help empower our customers to create smarter, more integrated buildings, it is important for us to exhibit our solutions in a connected environment instead of having siloed displays,” said Hank Monaco, vice president, marketing, Johnson Controls, Building Solutions North America. “At GSX, we have traditionally demonstrated our security, fire and life safety technologies, but we are excited to also layer in our additional capabilities in building controls and data-driven solutions to reinforce how critical they are to the equation of more secure and intelligent spaces.” Johnson Controls Digital Solutions group will be highlighting the following solutions that work at the nexus of data and business to gather insights that allow for smarter buildings, increased efficiencies and new business value. Assurance Services helps deliver preventative service insights to maintain high availability of security assets Enhancing life-safety standards Connected Converged Security (CCS), a SaaS-based platform that provides proactive, holistic, and smarter security solutions, CCS is a hardware agnostic software solution that enhances health and life-safety standards while providing measurable results and a basis for superior decision-making. As a result, customers can save on operational costs and hardware spend, and improve their security return on investment. Assurance Services and False Alarm Reduction Service (FARS), both offerings analyze data to increase safety, streamline operations and decrease costs through actionable insights into a facility’s space and security considerations. Assurance Services helps to deliver preventative service insights to maintain high availability and reliability of security assets. When problems are detected, a remote resolution team can automatically resolve issues in minutes, rather than days. FARS analyzes and identifies alarm patterns to deliver to help reduce false alarms and their associated risks and costs. Identify false alarm triggers Athena Security sends authorities an alert, getting people to the scene faster with an up-to-speed video feed into what’s going onThe software leverages artificial intelligence and machine learning capabilities to identify false alarm triggers and help to stop the activities that trigger them. In addition, cutting-edge startups from Johnson Controls Open Innovation – a global innovation center in Tel Aviv, Israel launched to foster collaboration between the company, customers and the startups to deliver effective solutions worldwide – will be revealing emerging technologies, including: Indoor Robotics A smart robot that operates indoors after-hours to run security and inspection missions, follow up on alerts, detect leaks and fires, patrol the indoor space, learn the environment and respond to various anomalies detected. Weapons detection Athena Security offers a sophisticated AI-driven solution that utilizes existing security cameras to work to detect dangerous objects, such as guns and knives, in real-time. The platform sends the authorities an alert, getting the right people to the scene faster with an up-to-speed video feed into what’s going on and where. Evolv Technology, a fully automated high-speed concealed weapons detection solution, integrates firearm and explosives detection with facial recognition for early detection of unauthorized concealed weapons or persons of interest.
PetroCloud, a provider of security, monitoring and automation solutions for customers with remote operations, announced that it has changed its name from PetroCloud to Twenty20 Solutions. “We’ve studied how to best represent ourselves to our customers, and this name transition is the perfect solution,” said Peter Shaper, interim CEO, Twenty20 Solutions. “Our new name better reflects who we are today and how we serve customers across many different industries.” Integrating security, monitoring and automation Twenty20 delivers real-time vision, intelligence and control into the remote operations of its customers, who work in a range of industries including energy, utilities, agriculture, construction and critical infrastructure. As the company continues expanding into new industries, the name change enables Twenty20 to reflect its broader market appeal and the level of clarity it gives customers into their remote operations. Twenty20 will continue to integrate real-time security, monitoring and automation in one place While the company name has changed, its commitment to serving its customers has not. Twenty20 will continue to integrate real-time security, monitoring and automation in one place and provide customers with unprecedented control of their remote operations. Industrial Internet of Things platform Founded in 2012, the company specialises in delivering surveillance, threat detection, access control and monitoring and automation of operations to customers via its advanced Industrial Internet of Things (IIoT) platform. Whether it’s providing clients with the ability to control who enters and exits remote facilities, protecting in-field assets from theft or vandalism, remotely detecting other threats to the environment or operations, or presenting a dashboard that provides customers with one place where they can see and control everything on their remote sites, Twenty20 is committed to supplying customers with breakthrough solutions to protect and improve their operations, no matter how remote the environment may be.
Legrand | AV Residential Solutions announces its 10-minute training schedule for CEDIA Expo 2019, taking place Sept. 12-14 at the Colorado Convention Center in Denver. In Booth 905, Legrand | AV brands and seven of its key technology partners will conduct 10-minute presentations covering a wide range of topics — all accompanied by giveaways — every half hour for the duration of the show. "Providing a quick and convenient way to learn about a wide of range of topics, our 10-minute trainings have always been very popular with our dealers at CEDIA," said Lauren Theobald, director of marketing at Legrand | AV. Deliver training sessions Legrand | AV will also give away products to participants at each session "This year, we've got a great lineup on tap that touches on every aspect of transforming the smart home. And as always, the giveaways aren't to be missed, so be sure to stop by our booth for all the fun." Over the course of the show, Legrand | AV and its partners will deliver 33 training sessions covering everything from TV mounting to human-centric lighting to remote monitoring and management. The company will also give away products to participants at each session. Presentation schedule A complete presentation schedule is provided below. Thursday, September 12 Time Presented by Title Presenter 10 a.m. On-Q Flat is where it's at! The secret to hiding power and AV cables James Rutherford 10:30 a.m. SANUS SANUS HeightFinder: The trick to saving you serious install time Ryan Hagberg 11 a.m. Luxul Introducing Legrand AV's new remote monitoring & management solution! Brannon Young 11:30 a.m. URC The value of a solid network for home automation platforms Jeff Rogers Noon Josh.ai Dynamics of voice control and the importance of the network Casey Levy-Tulloch 12:30 p.m. Ring Reducing crime in neighborhoods with three "Rings" of security Rich Way 1 p.m. Vantage Lighting for life: demystifying HCL & circadian rhythm Mark Moody 1:30 p.m. Nuvo Advantages of the new integrator-exclusive line of streaming audio players Gerald Willis 2 p.m. Domotz TRUCK ROLLS SUCK – the value out of your company Seth Rubenstein 2:30 p.m. Luxul Free network design with a guarantee! Josh Thurman 3 p.m. MAP The system approach Pat Kittridge 3:30 p.m. Sonos Networking for sound in all living spaces Matt Neumann 4 p.m. Just Add Power J+P AVoverIP: VLAN switching vs. IGMP switching Brian Sandifer 4:30 p.m. Luxul Luxul Epic Mesh: essentials for the connected home Chris Kovacek 5 p.m. Chief Outdoor mounts and AV storage solutions David Albright Friday, September 13 Time Presented by Title Presenter 10 a.m. Domotz TRUCK ROLLS SUCK – the value out of your company Seth Rubenstein 10:30 a.m. On-Q On-Q: RF lighting control – A better design and integration Shenali Parikh 11 a.m. SANUS SANUS HeightFinder: The trick to save you serious install time Ryan Hagberg 11:30 a.m. Luxul Free network design with a guarantee! Josh Thurman Noon IC Realtime Network security: best practices for surveillance Michael Caballero 12:30 p.m. Da-Lite The power of Parallax screen technology Wendy Cox 1 p.m. Just Add Power J+P AVoverIP: VLAN switching vs. IGMP switching Brian Sandifer 1:30 p.m. Vantage Lighting for life: demystifying HCL & circadian rhythm Mark Moody 2 p.m. Josh.ai Dynamics of voice control and the importance of the network Casey Levy-Tulloch 2:30 p.m. Ring Reducing crime in neighborhoods with three "Rings" of security Todd Towey 3 p.m. Luxul Luxul Epic Mesh: essentials for the connected home Chris Kovacek 3:30 p.m. Sonos Networking for sound in all living spaces Brian Yackel 4 p.m. Luxul Introducing Legrand AV's new remote monitoring & management solution! Brannon Young 4:30 p.m. Nuvo A speaker for every space, project, and price point Gerald Willis 5 p.m. QMotion QMotion: Using the QzHub3 for mobile app control and integration Shenali Parikh Saturday, September 14 Time Presented by Title Presenter 11 a.m. Luxul Luxul Epic Mesh: Essentials for the connected home Chris Kovacek 11:30 a.m. Luxul Introducing Legrand AV's new Remote Monitoring & Management Solution! Josh Thurman Noon Luxul Free Network Design with a Guarantee! Josh Thurman
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realized in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorized party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realized) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorize monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security marketSmart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognizable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Security isn’t easy for schools and universities. As education institutions increasingly become vulnerable targets for threats and attacks, they face the security challenges of maintaining a welcoming and open environment while ensuring the comprehensive safety of the students, teachers and staff. The balance between providing high levels of security with a certain level of convenience becomes crucial, especially when considering the large audience schools work with – the staff, administrators, students, parents and other organizations that utilize the facilities. In addition, schools are budget-conscious and must use their resources wisely. School administrators are often contacted repeatedly by organisations with multiple safety and security products The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products. PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. Data capture form to appear here! Ensuring procedures evolve There is no guarantee that what works to increase safety and security today will also work tomorrow. Because potential threats to safety and security can and do change, it is important that whatever policies, procedures and technology a school implements today can also evolve to address those changes well into the future. It is also important that schools take into account the need to distinguish among a wide variety of possible situations to ensure the appropriate people are notified and correct procedures followed. For example, the response to an active shooter situation is going to be very different from the response to a fight that occurs in a hallway. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, vice president of Facility Engineering Associates, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but says that value is almost completely realized in terms of forensics – reacting after an incident rather than during or before. A second priority for school security is controlling access to the building Communications, specifically mass notification systems, are an important tool for school security, says Timm. Mass notification must be able to provide emergency information to people in the gymnasium, or on a field trip. A second priority for school security is controlling access to the building. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors. But a video intercom works best in conjunction with other complementary products including remote-controlled locks that allow staff to admit visitors while safely sitting behind locked doors. The object of any solution is to eliminate or delay entry of an assailant long enough for police to respond and for school administrators to communicate with teachers and campus staff so they can lock down their classrooms or evacuate, depending on the situation.
TCIEXPRESS, a customer-oriented, multi-technology transport system in the Indian and International markets, has announced using Matrix Time-Attendance solution for increasing productivity and streamlining salary processing. This high-tech transport system pursuit value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world. TCIEXPRESS multi-technology transport system TCIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts and leave policies for the various locations and numerous workers at a central place was a very tedious task for them. Moreover, this leads to complex computation for salary based on the absent-present report. So, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. Ultimately, they were facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for Time-Attendance and payment process. Matrix offered COSEC VYOM for people mobility management for TCIEXPRESS's 3000 employees at 500 locations COSEC VYOM cloud-based system After a comprehensive discussion regarding problems and requirements, Matrix has offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based Time-Attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix Time-Attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS. COSEC VYOM cloud-enabled Time-Attendance system provides the following results - Quick salary processing Improves productivity Reduce paperwork Secure and on-demand network access Eliminates server cost, infrastructure cost, and maintenance cost Products Offered: COSEC DOOR FOT
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organizations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data center applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organization of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cybersecurity training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernized platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
Globally renowned electronic locks manufacturer, Mul-T-Lock has announced providing Glenveagh National Park in County Donegal, Ireland with over 50 of its high-tech eCLIQ locks so as to enable them to efficiently manage access control rights across the whole estate. Spanning over 170 square kilometers in area size, Glenveagh National Park is the second largest national park in Ireland. It features a number of rugged mountains, pristine lakes, tumbling waterfalls and enchanted native oak woodlands that together make up its ecosystem. At the center of the national park, on the edge of Lough Veagh, is Glenveagh Castle, a late 19th century castellated mansion, which was originally built as a hunting lodge. Advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock eCLIQ locking system With multiple facilities located on the sprawling site, Glenveagh National Park required a high-security and fully customizable access control solution, and therefore opted for Mul-T-Lock’s advanced eCLIQ locking system. The new and advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock, subsequently granting and revoking access to various areas of the estate whenever necessary. Remote access control solution Stephen Crowe, Regional Sales Manager for Mul-T-Lock, commented, “At Glenveagh National Park there is a need to restrict public access from certain areas for safety reasons, but at the same time, relevant staff should be able to access these areas whenever required”. He adds, “Our eCLIQ system proved the perfect solution for this, as administrators (those who manage the security system) can easily set-up tailored access permissions remotely via our CLIQ Remote Web Manager software. eCLIQ padlocks and cylinders Stephen further stated, “With eCLIQ, administrators also have the ability to set time-limited access – something that isn’t achievable with a mechanical system. For example, padlocks around the estate could be programmed to allow access to certain gates between Monday and Friday, from 8am to 6pm. It’s this customization that makes our system so popular.” The Mul-T-Lock system was specified and installed by Paul Speer at JP Speer Locksmiths, who added, “We now have over 50 eCLIQ padlocks and cylinders securing gates, offices and the Visitor Center within this impressive estate. The complete system is managed from the main office and once set up it is easily maintained, with the flexibility to change quickly whenever required.” Mul-T-Lock advanced eCLIQ technology Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed" Paul further said, “Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed. Glenveagh National Park has used mechanical systems in the past, but these haven’t been able to satisfy its access control requirements. Mul-T-Lock’s eCLIQ technology ensures that access rights are maintained for years to come.” Pat Vaughan, District Conservation Officer at Glenveagh National Park, finished by saying, “Mul-T-Lock’s eCLIQ system is the perfect fit for our Park as it has all the features that such a vast estate as ours requires. Park security He says, “During our summer season our visitor numbers quadruple and we have to employ seasonal staff to meet this demand. Having such a system as Mul-T-Lock’s eCLIQ means that we can set up temporary access for these workers, with all the relevant access rights required. The eCLIQ system also enables us to deactivate keys and revoke access at the click of a button.” Pat adds, “This is particularly helpful if any of our team accidently lose their keys, or if temporary staff forget to return keys after their time with us. We are extremely happy that we opted for the eCLIQ system to secure our beautiful estate; it will stand the test of time for years to come and has all the features we require to manage, build and secure our Park and its future.”
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilizing outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilize BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilize BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-Critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
It’s no surprise that a growing number of people are turning to motorbikes as their primary method of transport due to Spanish cities becoming increasingly congested. In fact, according to a 2016 study by the Institute of Environmental Science and Technology (ICTA-UAB) and the UAB Department of Geography, Barcelona is now the European city with the highest number of motorbikes per inhabitant. The research found that 372,278 trips are made on motorbikes every day in the city. Motorbikes began to experience a boom in 2004 when the Spanish government enacted a regulatory measure that allowed car drivers with three years of experience to switch to motorbikes with capacity up to 125cc. The ability to avoid congestion and complete journeys more quickly promoted exponential growth. Protecting motorbikes from thieves Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concernAlthough this has brought many benefits, it has also created a significant problem for users – where to park their motorbikes. Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concern. Similarly, city councils are cracking down on illegally parked motorbikes that obstruct access, and are removing them from pavements and other areas. It’s this situation that prompted Alicante-based motorcyclist, Alejandro Martin, to create Mimoto Parking, along with two other biking friends. As the company’s managing director, he takes up the story and explains, “We want our customers to be able to keep their motorbikes secure and avoid the fines associated with illegal parking. By creating conveniently located facilities that can be accessed at street level, without the need to negotiate dangerous ramps, we have reinvented the parking concept. “We offer a revolutionary service where owners can safely park and also store belongings such as helmets, jackets and gloves in lockers. Users can access our parking lots on a 24/7 basis and go about their business without worrying about their motorbike’s security.” Access code to obtain a parking space Although it only operates a few sites at the moment, the response has been incredible and Mimoto Parking has plans to operate over 40 facilities by 2021 and, in order to finance this rapid expansion, Alejandro Martin and his team is looking to attract additional funding from interested parties. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space The company’s success is down to the fact that Mimoto Parking has simplicity at its heart. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space. They then identify the facility that is most convenient, key in the six-digit code via a keypad when they arrive, and enter and park. Remote monitoring via Ralset’s ARC Utilizing a ‘pay as you go’ concept, leaving users simply re-enter the same six digit code at which point Mimoto Parking automatically charges them for the duration of their stay. Each facility is remotely monitored at all times via Ralset’s alarm receiving center (ARC) and a full intercom system offers user assistance when they need it. Alejandro Martin says, “When developing Mimoto Parking we knew that our success would hinge on our ability to implement access control and intrusion detection technology that could not only guarantee the highest levels of security but also be intuitive, straightforward to roll-out across multiple sites, and be as reliable as possible. “In order to find out more about what we could do, we invited leading security integrator and PACOM approved partner, Cettec Seguridad, to come in and hear about our requirements.” integrated access and alarm controller Doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads"Cettec Seguridad configured a solution based around the PACOM 8002 integrated access and alarm controller – an all-in-one platform that integrates the functionality required for a remote security system. PACOM 8002 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. Furthermore, doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads. The PACOM 8002 system would have to integrate seamlessly with Mimoto Parking’s mobile app and allow the ARC to monitor events at all times. Alfonso Lorenzo Robledano, business development director for Southern Europe at PACOM, states, “Cettec Seguridad asked us to make some adaptations to the PACOM Graphical Management System (GMS), which is based on a data communications platform that successfully integrates access control, alarm monitoring, video surveillance and many other building services into a single, remotely accessible system. “PACOM’s technical experts were able to modify the software’s algorithms and design new schematics to meet Mimoto Parking’s exact requirements and, in addition, deliver uninterrupted system operation, intelligent self-testing and multiple back-ups.” Manages the parking occupancy status Signs can be operated to indicate availability and the system can even be remotely reset when necessaryAs well as allowing customers to communicate directly with personnel at the ARC, the modified PACOM GMS can also manage the parking occupancy status at each site. Signs can be operated to indicate availability and the system can even be remotely reset when necessary. This level of scalability also means that new technologies can simply be added to as they are developed, offering Mimoto Parking the ability to further develop the system as required and future proof its investment. Just as importantly, PACOM and Cettec Seguridad collaborated to ensure that the system can be quickly and easily rolled out across any new sites as they are acquired. Each system controls one entry and one exit door using a single controller and keypad, which means minimal wiring and allows minor adjustments to be made as necessary. Meeting the objective of securing bikes Mimoto Parking’s Alejandro Martin is delighted with what has been achieved and praised PACOM’s willingness to work closely with his team and Cettec Seguridad to devise a unique solution. He concludes, “Our ability to keep customers’ motorbikes secure is fundamental to our success and therefore we needed to be 100 per cent confident that the technology we installed was able to meet this objective. “PACOM’s experts were a pleasure to deal with and as keen as we were to optimize our entire security and access control infrastructure. I’m looking forward to working together in the future as we expand Mimoto Parking and introduce new sites to our portfolio.”
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?