Ring, whose mission is to make neighborhoods safer, announced Ring for Business to provide business owners with the ability to protect their companies with Ring Alarm and Ring Video Doorbells and Security Cams the same way that homeowners have been doing for years. Small businesses are an integral part of our communities and, thanks to Ring, they now have access to smart, DIY security that’s free from long-term commitments, hidden fees and professional installation. With Ring for Business...
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
BlackWire Designs, a distributor in the custom installation market, announced that the company is now offering ProDataKey's (PDK) pdk.io, the industry's first completely cloud-based wireless access control system. The plug-and-play solution is easy for dealers to install, highly scalable, and simple for end users to manage. With its easy-to-use interface, pdk.io allows users to effortlessly manage cloud access control and see the status of every facility door in a single glance, while streamlin...
FlytBase, Inc., an enterprise drone automation company, releases a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications. The journey from the ‘early adopter’ phase to the ‘early majority’ phase of the adoption curve for drone deployments in industrial & commercial security will require: a) reliable, off-the-shelf hardware b) cloud-based, hardware-agnostic software, and c) faster time-to...
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effective...
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realized in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonom...
Feenics Inc., an award-winning provider of the Access Control as a Service (ACaaS) Keep by Feenics cloud-hosted platform, continues to address the upward growth of its security management software solution, adding Rachel Young as Regional Sales Manager, South Central U.S. and Daniel Tercey, Business Development Manager, West. Security management solutions expert As Regional Sales Manager, Young will be responsible for Texas, Oklahoma, Louisiana, Mississippi and Alabama. She spent the majority of her career with the integrator channel, most recently as the Regional Sales Manager for Diversified/MSW, a national organization based in Sterling, VA, and prior with Kratos/Securitas, where she became well-versed in the deployment of the Keep by Feenics hosted platform. “Addressing this new business sector and being part of the Feenics team as they continue to grow is exciting,” said Young. “Being familiar with Keep by Feenics and the advantages of this integrated security and access control management solution will certainly assist in increasing awareness and driving sales in the territory.” SaaS solutions in remote access control I enjoy selling SaaS products and Feenics is truly making an impact in the remote access control space with its cloud-based offering" Daniel Tercey, Business Development Manager, was formerly Sales Manager for software company PX Inc., Newport Beach, Calif. His experience includes SaaS-based customer acquisition software and IT-driven, managed services solutions. Tercey’s territory will include California, Arizona and Nevada, where he will focus on the end-user and consultant audience. “I enjoy selling SaaS products and Feenics is truly making an impact in the remote access control space with its cloud-based offering.” Paul DiPeso, Executive Vice President of Feenics, said the company is ramping up regional support with the appointment of Young and Tercey to target specific growth sectors. “We’re adding strategic roles to adequately cover our meteoric growth in specific markets, and there’s more to come,” he said. Feenics, ACaaS market leader Feenics continues to fortify its position as an ACaaS market leader, recently certified as an International Organization for Standardization ISO 9001:2015 company. Late last year, and to address global growth, Feenics opened an office in the Middle East, with Nancy Abou Eid leading operations from Beirut, Lebanon. Feenics is the maker of Keep, a cloud-hosted platform that provides extreme scalability, unprecedented flexibility and advanced security in ACaaS applications. It integrates native visitor management and a RESTful API that allows systems installers simple integration of a wide array of complementary systems and open hardware devices, generating new revenue streams while creating a path for customers to lower their total cost of system ownership. Keep by Feenics access control system Keep by Feenics gives users the choice of on-site servers or offsite cloud deployment, hosted by the public cloud Amazon Web Services. Keep significantly minimizes costs through simple, maintenance-free and automatic upgrades, patches, disaster recovery and back up.
Checkpoint Systems has unveiled the world’s most compact full performance, customizable, RF EAS antenna – the S20. S20 RF EAS antenna Retailers are dramatically ramping up investment in store design to improve the overall consumer experience and with store designs leading to a potential sales increase of up to 40%*, there is a justifiable return. With 50 years’ experience, Checkpoint Systems are collaborating with retailers and brands to align EAS antennae with these new store concepts. By reconfiguring the electronics used in EAS, Checkpoint has blown open design possibilities, meaning retailers no longer have to compromise on the EAS antenna at the entrance and the overall store design vision. This new generation of EAS antenna is designed for retailers whose brand image and customer experience are everything This new generation of EAS antenna is designed for retailers whose brand image and customer experience are everything. For the first time in the history of EAS antenna, the unique configuration of the S20 allows the traditional ‘gate’ look to be replaced with a visually appealing, elegant, sleek design. By introducing this pioneering technology, Checkpoint has actively changed the dynamic, helping retailers balance loss prevention with aesthetics. High impact LEDs Over and above its revolutionary sleek design, the S20 can be completed with custom finishes, textures and graphics to offer a wide choice of visual appearances. High impact LEDs deliver eye-catching accents to any store entrance and are available in a range of colors to complement brand identity. The S20 is ideal for apparel retailers looking to attract customers into their stores, maximize trading space and keep store entrances clear, the S20 can be free standing, wall or door mounted and works directly against metal. Remote service capabilities and data reporting help to improve up-time as Checkpoint’s engineers can continuously monitor the status, enabling issues and trends to be identified in real-time, ensuring the investment is performing efficiently. Remote service capabilities We have opened the door to a new generation of EAS antenna for retailers wanting to balance protection with design" Simon Edgar, Senior Director of Product Management, EAS Systems at Checkpoint Systems, commented, “There is not a lot that is ‘traditional’ about retail today. All physical stores face challenges to attract and retain customers and, in these new environments, ‘traditional’ doesn’t fit. We have opened the door to a new generation of EAS antenna for retailers wanting to balance protection with design, to fit the overall vision of their brand and store concept.” “The S20 is truly unique and offers apparel stores the excellent detection that they require, in a design that is sleek and elegant, with customizable options also available. Our striking new antenna design offers a beautiful profile and great performance, enhancing store aesthetics, improving the customer experience and controlling loss effectively – without compromise.”
BlackWire Designs, a distributor in the custom installation market, announces the availability of its new module for the integration of Rachio Smart Sprinkler Controllers into URC's Total Control 2.0 whole-house automation system. With this latest module, BlackWire Designs becomes the only distributor to support the integration of Rachio controllers into both the Control4 and URC platforms. Helping to nurture a beautiful yard, Rachio Smart Sprinkler Controllers make it easy to create custom schedules that automatically adjust for changing local weather. They work with current sprinkler systems, up to 16 zones, and provide users with complete control over their sprinklers via their smartphone or tablet using the Rachio Remote app. Utilizing Mobile Devices “We're proud to be the only distributor that offers the Rachio module for both of these automation platforms, and to provide the deepest level of integration available,” said Kevin Luther, owner of BlackWire Designs. “As the latest addition to our extensive driver marketplace, the Rachio integration not only provides a single-app control experience when utilising mobile devices but extends sprinkler control to the other interfaces homeowners use to manage their environments, such as handheld remotes and in-wall touchscreens. Coupled with our superior dealer support and round-the-clock service, there is nothing comparable on the market.” BlackWire Designs' Rachio module allows integrators to provide customers with control over their sprinklers Featuring complete two-way integration, BlackWire Designs' Rachio module allows integrators to provide customers with control over their sprinklers using the URC Total Control 2.0 interface of their choice — whether it's handheld remotes, in-wall and tabletop touchscreens, the Total Control 2.0 mobile app, or via their voice using Amazon Alexa or Google Assistant enabled products. Enhanced Automation Integration Capabilities include start and stop watering; enable/disable standby mode; pause zones; zone quick run; rain delay; and more. Enhanced automation integration can be added with two-way module commands and device events that trigger on-state changes in real time. BlackWire Designs' Rachio TC2 Module for URC is compatible with any Rachio Sprinkler Controller. The software license is free with the purchase of a controller from BlackWire and can also be purchased separately for customers who already have Rachio controllers in place.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, globally renowned residential security solutions firm, has introduced the next generation of its popular Signature Series Deadbolt with Home Connect. Signature Series Deadbolt With Home Connect Available in both traditional (round) and contemporary (square) models like the original version, the new Signature Series Deadbolt (2nd Generation) with Home Connect will feature two significant upgrades: The lock will utilize the newer Z-Wave Plus 500 Series chips. Supporting over-the air firmware updates, the new chip extends the lock’s wireless range while providing robust network security and encryption. The lock will also feature a smaller interior footprint, creating a more pleasing aesthetic and blending in more easily with any décor. Kwikset Single-Cylinder Deadbolt With these two substantial enhancements, the Signature Series (2nd Generation) is expected to extend the popularity of this well-received lock line. Utilizing the popular Kwikset single-cylinder deadbolt as its foundation, this is the ideal lock for the first-time homebuyer or homeowners who want to experience the safety and peace of mind of a Home Connect solution an entry-level price point. SmartKey Security Kwikset’s Signature Series Deadbolt offers advanced features for maximum security When connected to any standard smart home hub, these motorized deadbolts enable true remote locking and unlocking. This allows homeowners to remotely access and control the lock from anywhere in the world, using the app from the homeowner’s home automation controller. As a result, they can lock a door while traveling for work or vacation and can also remotely provide access to their home to service providers, guests or other family members. Users can also attain valuable information through their smart phone and have the peace of mind of knowing a door’s lock/unlock status. Like its predecessor, Kwikset’s Signature Series Deadbolt (2nd Generation) with Home Connect offers advanced features for maximum security and convenience, including Kwikset’s patented SmartKey Security, which not only protects against advanced break-in techniques but also allows homeowners to re-key the lock in seconds without a locksmith.
At InfoComm 2019 (booth 3055), Matrox will be showcasing its complete range of award-winning, IP-based products including quad 4K enterprise encoders, remote recorder appliances, 4K capture/encode/decode and multiviewer cards, 4K IP KVM extenders, lecture capture appliances, and 4K/multi-HD webcasting encoders. Be amongst the first to discover new products and features from Matrox. Matrox will be launching a major addition to its world-class portfolio, unveiling a revolutionary new line of video wall products. Not only will Matrox be revealing this new product alongside a show-stopping demonstration, Matrox will also be holding a raffle, where one lucky guest will take home this innovative new product. Increases Operational Efficiency Matrox Maevex 6100 Series enterprise encoders are also now supporting IPv6 Matrox Extio 3 high-performance IP KVM extenders will also be showcasing a brand new feature that brings IP extension and switching flexibility to the next level. A live demonstration will show how this feature drastically increases operational efficiency for users working on multiple source systems simultaneously. Matrox Maevex 6100 Series enterprise encoders are also now supporting IPv6, HLS streaming, and MOV recording. These rugged, quiet, and rack-friendly appliances are now equipped with every feature needed for the simplest and most complex encoding made easy—all without sacrificing on quality! Matrox Monarch EDGE will be making its InfoComm debut. Featuring next-generation 3G/12G-SDI and 25 GbE SMPTE ST 2110 connectivity, as well as versatile multi-protocol support—including RTMP, SRT, MPEG2. TS, and RTSP—this 4K/multi-HD webcasting and remote production (REMI) encoder delivers H.264 streams with resolutions up to 3840x2160p60 or quad 1920x1080p60 and profiles up to High 4:2:2. Real-World Benefits The AIMS Pro AV Group will be on hand at InfoComm in booth 375 The AIMS Pro AV Group will be on hand at InfoComm in booth 375, showcasing the real-world benefits of open standard approaches for the professional AV and installed systems market. Via a series of theater presentations, as well as a multi-vendor interoperability demonstration featuring the SMPTE ST 2110 standard, show attendees will discover the benefits of truly flexible, scalable, and interoperable AV-over-IP infrastructures. At the show, AIMS will also be hosting a panel session titled 'Audio and Video Streaming Using Established IP Standards' on Tuesday, June 11 at 1-3 p.m in Room W304E. Featured Products Matrox Maevex 6100 Series enterprise encoders - Matrox Maevex 6120 and Matrox Maevex 6150 dual and quad 4K enterprise encoders allow for the simultaneous capture, streaming, and recording of multiple 4K inputs. These powerful all-in-one appliances can feed cloud-based servers to reach internet viewers—including new simplified webcasting to multiple cloud-based and social media sites—push many streams over LAN for audiences on-premises, and record to local or network storage for later editing and viewing, all concurrently. Maevex PowerStream Plus software and APIs ensure easy operation, and are included with all Maevex 6100 Series appliances. Matrox Maevex 6020 Remote Recorder - The Panopto-certified Matrox Maevex 6020 Remote Recorder supports best-of-breed live streaming and recording to the Panopto video platform for education and business with easy 1-2-3 connection to your Panopto account. Users will benefit from simultaneous dual live streaming video and multiple on-device recordings of different qualities per input for the fastest VOD availability. It also boasts one-touch recording controls and whisper-quiet operation, on a rack-friendly, single-purpose appliance. Matrox Mura IPX video wall and multiviewer cards - Matrox Mura IPX video wall and multiviewer cards will exhibit the most advanced capture, encoding, decoding, and/or display capabilities from a single card by streaming and recording desktops, entire video walls, and selected regions of interest—with pixel-for-pixel or scaled-down representation of the display wall—over LAN and internet. Matrox Extio 3 IP KVM extenders will deliver exceptional 4Kp60 4:4:4, dual 4Kp30 4:4:4, and 2Kp60 4:4:4 performance Matrox Extio 3 IP KVM extenders - Matrox Extio 3 IP KVM extenders will deliver exceptional 4Kp60 4:4:4, dual 4Kp30 4:4:4, and 2Kp60 4:4:4 performance over a standard 1 GbE network—at unprecedentedly low bitrates. Extio 3 will also demonstrate a brand new feature designed to drastically increase operational efficiency for users working on multiple source systems simultaneously. Extio 3 cards and appliances work with COTS network switches, illustrating a scalable and cost-effective KVM matrix over IP to securely route any system to any remote location on the network. Matrox Monarch EDGE 4K/multi-HD webcasting and remote production encoder - The Matrox Monarch EDGE 4K/multi-HD encoder will demonstrate several webcasting workflows, including streaming 4Kp60 content that ensures high-quality viewing experiences on any size device. Attendees will also learn how to leverage Monarch EDGE with multi-channel online video platforms (OVPs) like YouTube, to capture and stream up to four cameras, allowing the viewer to select and/or switch to their preferred camera views. Matrox Monarch LCS lecture capture appliance - The Matrox Monarch LCS multi-source streaming and recording appliance will exhibit how IT administrators can readily integrate these encoders into today’s most popular open video and learning management systems, and how operators can in turn, easily define profiles for live streamed and recorded lectures by mixing camera and presentation material.
Dahua Technology, a video-centric smart IoT solution provider, has announced the addition of targeted vertical market solutions in the North American market. Vehicle inspection is one area where contemporary technology is rising to address a critical need. Preventing restricted items from entering high-security environments has traditionally been limited to the use of mirrors and police dogs, where blind spots and human error put detection at risk. In order to combat this problem, Dahua Technology offers two models of its Under Vehicle Surveillance System (UVSS). The system can provide license plate capture using a compatible LPC camera. The large field of view (approximately 180°) of the UVSS can capture the entire undercarriage of a vehicle when it’s driving through, which it then generates into an image in less than one second for immediate scrutiny. A portable version (DH-MV-VDM5021E-00) is built for ease of use, and an in-ground version is also available. Both options are well-suited for airports, prisons, and border control. IR License Plate Capture Cameras Both LPC cameras have 1/2.8-in STARVIS CMOS sensors, dual-stream encoding, Ultra Wide Dynamic Range (140 dB) and True Day/Night (ICR)Two high-performing partners to the UVSS are Dahua Technology’s 2MP IR License Plate Capture (LPC) cameras. These cameras capture clear images of license plates from up to two lanes of traffic at once, providing 1080p resolution at 30 fps for users to discern plate numbers. Both LPC cameras have 1/2.8-in STARVIS CMOS sensors, dual-stream encoding, Ultra Wide Dynamic Range (140 dB) and True Day/Night (ICR). Model DHI-ITC237-PW1B-IRZ has a 2.7 mm to 12 mm motorized vari-focal lens and can capture images of license plates from vehicles traveling up to 12 MPH. Another model, DHI-ITC237-PU1B-IR, boasts a 5 mm to 50 mm vari-focal lens and can capture license plate images of vehicles traveling up to 25 MPH. Coupled with a Dahua NVR or Digital Surveillance Software (DSS) Video Management System (VMS), LPC cameras become a complete traffic management or parking solution. Remotely Managing NVRs Dahua Technology’s enterprise-level DSS takes VMS to the next level. The all-in-one platform is preloaded with powerful software to improve system scalability. It lets users remotely manage off-site NVRs and other Dahua devices with real-time monitoring and playback. With a unified Dahua solution, integration worries are eliminated and installation and configuration become simpler. DSS offers a broad range of advanced features, including POS integration, Video analytics (IVS) and system redundancy DSS offers a broad range of advanced features, including POS integration, Video analytics (IVS) and system redundancy. The platform doesn’t require channel licensing, which is hard to find on other VMS systems. The DSS7016DR-S2 model is perfect for medium to large systems, with a variant that supports mobile recorders for fleet vehicle management, while the DSS4004-S2 is perfect for smaller systems. EVS For IP Video Surveillance Rounding out the latest additions to the Dahua portfolio is Enterprise Video Storage (EVS). Increasing the scale of storage, the high performance of EVS is ideal for medium-range to high-end IP video surveillance applications that demand flexibility, reliability, and centralized storage management. It is compatible with numerous third-party devices, making it the perfect solution for surveillance systems with or without a VMS. Its open architecture supports multi-user access and is compatible with ONVIF 2.4; it also uses Internet Small Computer System Interface (iSCSI) protocol for data transmission. It is available with 24 HDD (DHI-EVS7024S-R) and 16 HDD (DHI-EVS5016S-R) options: the former supports 768 IP camera channels with 1536 Mbps of incoming, recording, or forwarding bandwidth; the latter supports 512 IP camera channels with 1024 Mbps of bandwidth. Meeting Specific Vertical Requirements Dahua’s capabilities are becoming wide-ranging in the US, especially when it comes to a complete end-to-end solution"“This expansion of our product portfolio demonstrates that Dahua Technology not only serves the general video surveillance market but also meets specific vertical requirements,” commented Tim Shen, director of marketing at Dahua Technology USA. “Dahua Technology’s capabilities are becoming wide-ranging in the US, especially when it comes to a complete end-to-end solution or vehicle-related security products.” These solutions, along with Dahua Technology’s other innovative video surveillance products, were featured last week at Dahua’s booth at ISC West, April 10-12, in Las Vegas.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Security isn’t easy for schools and universities. As education institutions increasingly become vulnerable targets for threats and attacks, they face the security challenges of maintaining a welcoming and open environment while ensuring the comprehensive safety of the students, teachers and staff. The balance between providing high levels of security with a certain level of convenience becomes crucial, especially when considering the large audience schools work with – the staff, administrators, students, parents and other organizations that utilize the facilities. In addition, schools are budget-conscious and must use their resources wisely. School administrators are often contacted repeatedly by organisations with multiple safety and security products The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products. PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. Data capture form to appear here! Ensuring procedures evolve There is no guarantee that what works to increase safety and security today will also work tomorrow. Because potential threats to safety and security can and do change, it is important that whatever policies, procedures and technology a school implements today can also evolve to address those changes well into the future. It is also important that schools take into account the need to distinguish among a wide variety of possible situations to ensure the appropriate people are notified and correct procedures followed. For example, the response to an active shooter situation is going to be very different from the response to a fight that occurs in a hallway. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, vice president of Facility Engineering Associates, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but says that value is almost completely realized in terms of forensics – reacting after an incident rather than during or before. A second priority for school security is controlling access to the building Communications, specifically mass notification systems, are an important tool for school security, says Timm. Mass notification must be able to provide emergency information to people in the gymnasium, or on a field trip. A second priority for school security is controlling access to the building. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors. But a video intercom works best in conjunction with other complementary products including remote-controlled locks that allow staff to admit visitors while safely sitting behind locked doors. The object of any solution is to eliminate or delay entry of an assailant long enough for police to respond and for school administrators to communicate with teachers and campus staff so they can lock down their classrooms or evacuate, depending on the situation.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Allegion, globally renowned provider of security products and solutions, has announced that the Schlage AD electronic locks, NDE networked wireless locks, LE networked wireless locks and MT multi-technology readers now support contactless student IDs in Apple Wallet. Allegion - CBORD collaboration Allegion worked with CBORD and Apple to enable a mobile credential leveraging the industry global standard NXP DESFire EV1 security technology to provide higher education campuses with an easy-to-implement solution for the enablement of contactless student IDs for iPhone and Apple Watch. The University of Tennessee, University of Vermont and University of San Francisco are among the first schools to leverage the solution. “A recent study from The Center for Generational Kinetics found that 95 percent of Gen Z owns a smartphone and being connected is their norm. Because of this, universities are tasked with meeting student preferences while also ensuring campus security,” said Jeff Koziol, Allegion business development manager, campus software partner. “Allegion is proud to expand its product features to provide higher education campuses seamless yet flexible security solutions, and an improved mobile access experience for students and faculty members alike.” Contactless student IDs Having contactless student IDs in Apple Wallet makes it easier and more convenient for students and faculty to access buildings like residence halls or the library, as well as make payments on and around campus for coffee, laundry and other purchases with iPhone and Apple Watch. Universities can remotely issue credentials over-the-air, and those credentials are protected by two-factor authentication and can be remotely deactivated by the student or university. MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard "As an institution that values innovation, it's important to us that we are always adapting to the way students use technology to enhance the campus experience," said Chris Cimino, senior vice chancellor for finance and administration. "Being able to access your VolCard on your iPhone is one of the many ways UT is continuously improving to meet expectations for a modern campus.” MIFARE DESFire EV1 technology MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard and one of the top solutions in contactless credentials. By leveraging Allegion and CBORD’s solution with DESFire, higher education campuses are now able to take advantage of an open architecture and work with various manufacturers without being locked into a siloed proprietary solution. This new capability is compatible with the following Schlage commercial solutions: AD electronic locks - Schlage AD-400 wireless locks were designed to reduce installation costs on interior access-controlled doors, such as student rooms, faculty offices, classrooms and lab spaces, while offering the adaptability to support future evolutions in technology. The AD-400 and AD-300 wired locks are available in cylindrical, mortise, mortise deadbolt and exit trim chassis options, and they integrate into popular physical electronic access control systems (PACS). NDE networked wireless cylindrical locks - NDE wireless locks integrate into popular electronic access control systems from PACS providers to bring the benefits of electronic access control deeper into university buildings. NDE packages the cylindrical lock, credential reader and access control sensors together in to a small footprint that is both easy to install on university campuses and affordable. LE networked wireless mortise locks - The LE design packages the mortise lock, credential reader and access control sensors together into a small footprint that is both elegant and affordable. They feature two sleek trim options with broad range of decorative lever choices to match the style of any residence hall. MT Multi-Technology readers - Schlage MT multi-technology readers are designed to simplify university access control solutions and allow a transition from proximity or magnetic stripe (on a physical student ID) to more secure, encrypted smart card technology or mobile credentials in the Apple Wallet. Schlage’s AD Series Locks This extended offering is the next wave in Allegion’s pursuit to work with other providers in the industry for digital credential rollout in universities. Recently, the company announced its collaboration with Transact to enable contactless student IDs in Apple Wallet through Schlage’s AD Series Locks at Mercer University.
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and service provider, is trusted, for the first time in Amman, with the job of keeping Landmark Amman Hotel safe in its phase 2 CCTV improvement. Need of a competent surveillance system The other challenge concerned old system’s storage, which couldn’t meet the requirement of local policeIt is difficult for a large-scale hotel like Landmark Amman to patrol the grounds and premises of the hotel relying only on security personnel. Moreover, there might be no standardized evidence for the police to check without a competent surveillance system when an accident happens. There are two aspects of the old system to be improved. The analog system the hotel was using was not easy to manage, the problem which was exacerbated by the condition that a great number of cameras were broken. The other challenge concerned old system’s storage, which couldn’t meet the requirement of local police. IP camera and NVR solution Dahua Technology’s CCTV solution comprising IP camera and NVR solves the problems just right. IPC-HDW1431S, the 4MP WDR IR Eyeball Network Camera, supports Smart Coding (H.265+ & H.264+), Intelligent Video Analysis(IVS), Wide Dynamic Range(WDR), Smart IR Technology, etc., which is fully capable of smartly capturing the 4MP resolution images in hotels. NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite NVR can be served as edge storage, central storage And NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite Network Video Recorder, which supports 4K and H.265 encoding technology, can be served as edge storage, central storage or backup storage with an intuitive shortcut operation menu for remote management and control. Compatible with ONVIF 2.4 protocol Easy to install, it is compatible with numerous third-party devices making it the perfect solution for surveillance systems that work independently of video management system (VMS). It features an open architecture that supports for multi-user access and is compatible with ONVIF 2.4 protocol, enabling interoperability with IP cameras. Dahua surveillance system has helped Landmark Amman Hotel find a new way to enhance the guest experience through improving the level of security with reduced property damage and thefts in hotel. It also improved team cohesion and work efficiency of the hotel employees. Furthermore, the hotel could increase revenue by monitoring and invoicing according to actual numbers of guests, and be compliance with local authorities’ security and safety regulations.
Business Finland together with Metsä Group is creating the Metsä pavilion for the 2020 summer Olympics and Paralympics in the grounds of Embassy of Finland in the heart of Tokyo. The pavilion will operate as the official National Hospitality House during the Olympics and Paralympics for Finnish teams. digital locking systems Among the topics promoted in the pavilion are smart energy, sustainability, digitalization, health and wellbeing Among the topics promoted in the pavilion are smart energy, sustainability, digitalization, health and wellbeing. It was a logical decision therefore that iLOQ would be a partner of the Metsä pavilion, and deliver its self-powered, digital locking system to the house. iLOQ is an innovator in the locking industry and has a strong portfolio of safe and sustainable products that maximize safety and minimize administration and lifecycle costs. iLOQ’s mobile and digital locking systems are self-powered and enable electronic locking without batteries or cables. They cater to the needs of industry and the utility sector by providing smart locking and secure and simple access management solutions for the buildings and spaces used daily. President and CEO of iLOQ, Heikki Hiltunen, commented: “We are delighted to showcase our state-of-the-art and environmentally friendly digital and mobile access management systems in the Metsä pavilion. This will open business opportunities for us in the Japanese markets and among Japanese customers and will help us establish new connections with partners in the region and globally”. Advanced remote control services In accordance with the Company’s environmental program, iLOQ conserves natural resources and the environment. For example, it maximizes the usability of their products, minimizes battery and metal waste, favors recyclable packaging and reduces the need for maintenance-related travel by developing advanced remotely control services. Every year, iLOQ’s solutions save 27,000 kg or battery waste and, compared to mechanical locking solutions, 7000 kg of metal waste. The aim of the pavilion is to provide Finnish companies with the opportunity to create new business in Japan and gain new contacts in the market. iLOQ – Metsa platform integartion We are happy to cooperate with iLOQ and present their locking solutions “We are happy to cooperate with iLOQ and present their locking solutions among other leading Finnish technologies in the Metsä pavilion. We believe that Finland can offer numerous complementary products, services and innovations for Japan” states Petri Tulensalo, Head of Sports Cluster, Business Finland. Joni Lampinen, Chief Marketing Officer, explains: “We are looking forward to working closely with the Metsä pavilion and raising iLOQ’s brand awareness in Asia. We have a lot to offer customers and partners in the region, and they will be able to see this firsthand as our locking systems will be in use in the pavilion”.
Two of the most important priorities in a manufacturing environment are safety and productivity. Failure to follow safe work practices around machinery on a factory floor can result in serious injury, while poor productivity can erode profits and ultimately threaten the viability of the business. At WCCO Belting, a Wahpeton, North Dakota-based manufacturer of custom rubber products for agriculture and light-industrial conveyor equipment, a March Networks® video surveillance solution plays a key role in enhancing both safety and productivity. Monitor Work Processes “Recently, for example, we had a minor safety incident on one of our machines that was captured by the system,” said Michael Marsh, Senior Technology Administrator. “The video not only allowed us to determine the cause of the incident, it also helped us create a proprietary piece of equipment to ensure that the accident would never happen again.” Safety was the main reason WCCO Belting acquired a March Networks system in 2015 Safety was the main reason WCCO Belting acquired a March Networks system in 2015, but the company soon discovered it could use the technology for other equally important priorities. “We found that we could use the video solution for time studies, to be more effective and efficient,” said Marsh. WCCO engineers use the video to monitor work processes and then tweak them to speed production, while ensuring optimum quality. Security System Integrator The company selected Marco Technologies as its security system integrator in 2015, and acquired March Networks 8000 Series Hybrid NVRs shortly thereafter. Two years later, when WCCO Belting decided to also equip a second production facility in Arlington, Texas, it upgraded to a March Networks Command™ Recording Software (CRS) solution in North Dakota and moved the 8000 Series Hybrid NVRs to its Texas facility. At the same time, the company deployed March Networks Command Enterprise Software to tie all the video from its geographically-dispersed facilities together, said Marsh. The software enables WCCO Belting “to oversee everything and manage the entire system from a single point of entry.” In addition, approximately 50 March Networks IP cameras — including indoor domes with wide dynamic range and outdoor IR bullet cameras — provide crystal-clear video of activity on the company’s factory floors, loading docks and parking lots. Remote Configuration Marsh cites ease of use and outstanding support as the main reasons for selecting the video solution. “The technology is easy to implement, easy to use and easy to navigate. Support has also been great. When we ran into some early issues, they responded quickly to help resolve the problem.” We didn’t have to uproot a lot of the architecture already in place" “More recently, when we decided to expand the system to include our second location, it was Marco that recommended the CRS solution and the redeployment of our NVRs to Texas. It was really plug and play. That was the winning piece for us. We didn’t have to uproot a lot of the architecture already in place.” A system that was easy to rollout was important because WCCO Belting’s IT department does the physical camera install themselves, while partnering with Marco Technologies for remote configuration. Command Mobile App “It’s one of the reasons we like March Networks, because we’re a hands-on IT department,” explained Marsh. “We like to make sure we’re always on top of things and that we understand the equipment we’re working with. If we can’t install it ourselves and need someone to come in and do it for us, it just creates future costs.” Aside from the IT department, which has administrative access to the system, authorized supervisors and managers at WCCO Belting are able to audit video for safety and security purposes. Temporary access is also provided to engineering staff for time studies. Marsh and several supervisors also have access to video through the Command Mobile app on their smartphones. Available as a free download from the Apple Store and Google Play, Command Mobile runs on iPhones, iPads and Android devices. Track Offending Vehicle Remote, after-hours access to video proved valuable during the previously mentioned safety incident, for example, “by allowing managers to pull up video from home and use it to make decisions quickly,” said Marsh. The video solution has also proven useful to local law enforcement, as some of the bullet cameras covering the employee parking lot at the North Dakota facility also have a clear view of North 9th St., a busy artery in the town of 8,000. The video resolution was so good that we were able to quickly track the offending vehicle" “One day, I was called to the front desk and met by two police officers and three sheriffs,” recalled Marsh. “They wanted to come to my office but didn’t say why. I was never so nervous in my life. Once in my office, they explained that they wanted to see if we had any recorded video to help them solve a hit and run a block and a half down the road. We did, and the video resolution was so good that we were able to quickly track the offending vehicle.” Rubber Belting Solutions “We’ve had two law enforcement visits since then, so now when they show up, I know I’m not in trouble,” joked Marsh. A family-owned business, WCCO Belting was founded in 1954 by Ed Shorma, a Korean War veteran who mortgaged the family car and borrowed $1,500 to buy a shoe repair shop. Propelled by Shorma’s strong work ethic and talent for ingenuity, the business grew and evolved as a manufacturer of rubber belting solutions, leading to Shorma’s recognition as Small Business Person of the Year by U.S. President Ronald Reagan in 1982. WCCO Belting is currently led by president and CEO, Tom Shorma, Ed’s son, and has 270 employees — 200 in North Dakota and 70 in Texas. The company’s rubber product solutions are sought after worldwide, and exported to customers in more than 20 countries. The company won North Dakota’s Exporter of the Year award in 2003, and in 2010 and 2016 it was the recipient of the Presidential ‘E’ Award and ‘E-Star’ award for its export promotion efforts.
Conditions could not be more challenging than in Borneo's rainforest, where temperatures reach up to +30 degrees Celsius and humidity can be as high as 100 percent. Accessible only by boat or plane, the wilderness of Mulu national park, a UNESCO world heritage area since 2000, covers about 544 square miles, an area equal to the size of Singapore. The Gunung Mulu National Park covers an area of about 544 sq. km, as big as Singapore and about half the size of the Blue Mountains National Park in NSW, Australia. Crowned a World Heritage Area by UNESCO in 2000, this tropical rainforest is home to some of the largest documented cave systems on the planet. Operating as a national park since 1974, Mulu obtained UNESCO world heritage status in 2000. Borsarmulu Park Management Sdn. Bhd is an international company, based in Sarawak, that provides complete tourism services for the industry and the Borneo Government, and manages Mulu. The Mulu Batcam project’s requirement was to enable the capture of clear video images and sound from selected sitesReal-Time Surveillance Of Remote Sites The Mulu Batcam project’s broad requirement was to enable the capture of clear video images and sound from selected sites within the cave network to observe and monitor wildlife, and to provide real-time surveillance of the remote sites. Within this giant space, the environment is oppressive; day-time temperatures typically hover around 30°C, with humidity ranging up to 99%. In 2006, ctg Security Matrix Pty Ltd facilitated the initial installation, including the back-breaking task of cabling kilometres through the inhospitable jungle environment. When the Batcam project required an update in 2016, Mr Charles Tomas, Principal and Specialist Operational Security Advisor at Ctg Security Matrix, was called upon once again. Having some recent experience working with the Bosch MIC cameras, he recommended them for the challenging task – to place 3 ROV cameras inside the largest cave passage in the world, to be connected and remotely controlled via a fiber optic line some 3.8 km away. Requirement Of Robust Camera An extremely robust camera was required to function in total darkness, in a remote cave set in the depths of a tropical rainforestThe images were also required to appear on an all-weather TV screen at the so-called Bat Observatory, situated next to Deer Cave. An extremely robust camera was required to function in total darkness, in a remote cave set in the depths of a tropical rainforest. The cameras were to be placed in the biggest cave chamber in the world (175 metres wide and 120 metres high). Mulu is a truly wilderness, accessible only by plane or boat. All tools and equipment had to be flown in, then carted or carried to the destination, and painstakingly installed in the cave system. The Bosch MIC cameras were the perfect choice for this harsh environment, and more than met the requirements. Park visitors, Borsarmulu Park management and scientists can now observe the bats (as well as other creatures that dwell in the cave system) up close without disturbing their habitat.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
Even the most effective technologies usually require some level of human involvement. What new technologies do, generally speaking, is change the nature of a human’s role. Most jobs in today’s world are vastly different than 50 years ago, in many cases because of the changing role of technology. In the physical security world, what specific impact does technology have on the human element of systems? We asked this week’s Expert Panel Roundtable: Have recent developments in security systems made manpower more, or less, important to the equation? Explain.