Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, is showcasing its latest access control solutions at ISC West 2021. ISC West 2021 marks the first year Suprema is operating a stand-alone booth at ISC West and Suprema is demonstrating advanced access control features of its BioStar 2 solution along with new products, X-Station 2 and FaceStation F2, that are equipped with contactless features suitable for the post-pandemic era. BioStar 2 access contro...
Identiv, Inc, a pioneer in digital identification and security, will showcase its recently expanded visual intelligence and operating expense (OPEX)-focused solutions at ISC West 2021, including its innovative video management system (VMS) and access-control-as-a-service (ACaaS) offerings. Attendees will be able to view Identiv’s complete product portfolio, including physical access control and cybersecurity, video and data analytics, door readers, and radio-frequency identification (RFID...
HID Global, a globally renowned company in trusted identity solutions, has announced two new additions to its broad family of RFID asset-tracking tags. The HID SlimFlex Ultra technical label is optimized for the strongest durability compared to other labels, and the HID Seal Tag edTamper Aura is designed to securely track and trace highly sensitive materials and digitally detects unauthorized access to sealed containers like boxes or crates. “We continue to solve customer challenges acros...
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerized systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this we...
A research report has revealed the innovative new ways that retailers are using RFID technology in-store, in order to improve profitability. Authored by Emeritus Professor, Adrian Beck from the University of Leicester and the ECR Retail Loss Group and supported by Checkpoint Systems, ‘Utilising RFID in Retailing: Insights on Innovation’ research report highlights how companies are employing the technology for a broader range of purposes. Benefits of RFID in retail The research rep...
With 13 participating companies and organizations, Israel will make an impressive presence in DEFEA Exhibition, in Athens, Greece. It should be noted that the close strategic relationship developed between Greece and Israel, now also expands in the field of defense industry. DEFEA Exhibition SIBAT, the International Defense Cooperation Directorate of the Israel MOD, will co-ordinate the country’s participation in a National Pavilion. SIBAT is positioned within the IMOD, while having a cl...
Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond normal expectations. SALTO Systems has invested years of working with some of the best minds in the security industry, their community of security specifiers and installers, to build the most reliable and smartest electronic padlock on earth. SALTO Neoxx Padlock With exceptional attention to detail, premium materials, and all SALTO technology inside, their latest padlock, SALTO Neoxx, looks great while packing technological power. The SALTO Neoxx Padlock is a versatile locking solution that enables users to benefit from the advantages of electronic access control, where previously it was only possible to use a mechanical locking solution (i.e., perimeter or fire access gates, industrial equipment yards and residential storage areas). Smart padlocks for enhanced security Smart padlocks offer more security, easier maintenance and flexible access methods Smart padlocks offer more security, easier maintenance, flexible access methods, and a better overview of the lock’s and user’s activity. As portable as conventional padlocks, security is enhanced by removing any lock’s most vulnerable part, the mechanical key and adding the benefits of being operated with a mobile app and contactless smart key, managed by an advanced web-based access control technology platform. The SALTO Neoxx Padlock offers a unique solution, ideal for utility providers, electric power stations, telecom network services, industry applications, and more, along with property services that need an additional level of security to control specific doors, like gates or storages, without losing a piece of convenience and control. Advanced electronic access control technology These industries often require equipment and facilities on the perimeter or out in the field that, even though they are in a remote location, require the latest in electronic access control. And because they are often outdoors, the electronic solution they need has to include a product that can weather the extreme elements from rain and dust to snow. Built to withstand the most extreme weather, the Neoxx is IP68 certified for waterproof performance and high durability. Remote management of keys, locks and access rights Together, with the most complete locking platform on the market (electronic locks and cylinders, online readers, and locker locks) and SALTO core technology (SVN, BLUEnet, and JustIN Mobile system features) inside, the SALTO Neoxx padlock enables managing keys, locks, and access rights on-the-go, remotely from a single, highly visual and easy-to-use web-based interface. SALTO Neoxx G4 electronic padlock’s main features include: High-security padlock made of hardened steel with a removable shackle model option, which can be completely detached from the padlock body. Shackle: Width 11mm - Length 50mm. Security chain non-demountable model with safety chain to protect the padlock from burglary/dropping. Cover case with double-layered structure 70mm x 115mm x 32mm guarantees the ultimate protection from falls, shocks, and the most extreme environments or usage. RFID, BLE (Bluetooth Low Energy) and NFC technologies onboard. Users can easily operate the electronic padlock with their smart card or with an iOS or Android smartphone. Compatible with SALTO Space – Data-on-Card– and the SALTO KS – Keys as a Service – cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. Tested up to 130,000 operations on a standard set of batteries (4 x LR1). Monitor battery status (to optimize maintenance and battery life). Changing or removing batteries is simple and secure – users only need standard LR1 batteries and a special tool. IP68 certification: Waterproof performance and high durability. Tested against extreme temperatures: Including freezing conditions (-35ºC) and high heat (+65ºC). Fully certified according to CE, FCC, MIT, Mechatronic certification EN 16864:2018 and IK09.
Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs’ Association's (NSA) annual conference and exhibition – NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition. NSA 2021 Annual Conference and Exhibition The annual conference is an opportunity for the members of the nation's more than 3,000 sheriff's departments to learn and share information related to all parts of their mission, including law enforcement, jail operations, prisoner transport and courthouse security. Tim Meyerhoff, Director, North America, Iris ID, said biometric technology plays an increasingly important role in helping sheriff's deputies complete their jobs daily. Tim said, “Rapid and accurate identification of people is a major law enforcement need.” Contactless iris-based biometric systems Tim adds, “There is no room for error when it comes to booking and release of those charged with crimes. And our contactless iris-based biometric systems, the most accurate on the market, are ideal as departments continue battling the COVID-19 virus.” Among its many products, Iris ID will highlight three widely used by law enforcement organizations. iCAM M300 and iCAM R100 access control readers iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field The iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field. The iCAM M300 offers access to the three primary modes of biometric identification – iris, facial and fingerprint – with communication protocols including NFC, Wi-Fi, Bluetooth, GPS, 4G LTE and more. The iCAM 300 also provides magstripe and contactless card support and offers an MRZ reader to verify ePassports. Iris ID iCAM R100 readers replace the need for PINs, access control cards and RFID fobs to enter integrated smart lockers and key management cabinets protecting keys, weapons, evidence and other valuable assets stored by sheriff's departments. Iris ID biometric technology used by US government agencies Law enforcement agencies across the U.S., including the Los Angeles County Sheriff's Department, the York County (Penn.) Sheriff's Office and the U.S. Border Patrol use Iris ID biometric technology. Iris ID iCAM 7S series product is currently included in the Los Angeles sheriff booking stations. It is used to add iris-based identity authentication capabilities, resulting in more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints.
Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, announced the new product launch of the X-Station 2, a versatile intelligent terminal with credential options of cellphone access, QR, and barcodes as well as RFID cards and PIN. Multiple credential options X-Station 2 enables flexible access control system design by supporting multiple credential options. The terminal is compatible with most types of existing RFID cards including EM, MIFARE, iCLASS, DESFire, and FeliCa, but also lets users go card-less by offering cellphone credential options including QR codes and barcodes. The terminal can read QR codes and barcodes composed of up to 32 ASCII code strings issued on Suprema BioStar 2 or 3rd party systems. X-Station 2 can also communicate with NFC and BLE signals, allowing both Android and iOS device owners to use cellphone access. Key features X-Station 2 improves security while safeguarding user data Equipped with a secure boot process, Open Supervised Device Protocol (OSDP), and cameras for image log capture, X-Station 2 improves security while safeguarding user data. X-Station 2 is also easy to install, use and maintain with features like Power over Ethernet (PoE), intuitive GUI on a 4” wide touchscreen, and IP65 rating. Versatile options X-Station 2’s various credential options allow it to meet all kinds of access control needs. Visitors can be issued QR codes or temporary mobile access cards while employees and registered users can use RFID cards and PIN codes to access areas that require additional security. When used in combination with BioStar 2 or 3rd party software with time and attendance, HR management features, X-Station 2 can track employee work hours, completed tasks as well as vacation days, photocopy credits, canteen tickets, and subscription validity. “X-Station 2 is a truly versatile terminal that can be installed in any facility with time and attendance, visitor management, and access control needs. Its cellphone credential options of QR code and mobile access cards can also satisfy contactless and non-face-to-face needs. I’m excited to see how the market will respond to X-Station 2,” said Hanchul Kim, CEO of Suprema Inc.
Bird Home Automation, manufacturer of IP video door stations launched the first hybrid IP intercom D1812 for upgrading Doorking telephone intercom systems. The new model adds DoorBird IP technology to installations of the Doorking 1812 series while keeping their analog telephone intercom system running. State-of-the-art intercom system The electronic core and the stainless-steel front panel in DoorBird design are easily installed via Power over Ethernet (PoE) and fit the existing Doorking 1812 housing perfectly. As a result, the new upgrade allows homeowners to have state-of-the-art access control and intercom system with minimum effort. Advanced features The D1812 hybrid upgrade includes numerous high-tech features, remotely configurable via the free DoorBird app and with no licensing fees of any kind: 1080p camera with ultra-wide-angle 180 hemispheric lens and night vision Free Cloud recording RFID reader, 13.56 MHz with MIFARE DESFire support, remotely manageable 4D motion sensor Power over Ethernet (PoE) Wi-Fi enabled, 2.4 GHz if a network cable is not used Wiegand protocol support (26, 30, 31, 34, and 44 bit) Illuminated keypad with up to 500 remotely manageable PIN codes Individual schedules, e.g., to trigger relays or smart home commands upon certain events Geofencing for automatic gate opening when returning home Open API for third-party integrations such as Control4, URC, RTI, Crestron, etc Support for NVRs such as Synology, Luma, Lilin, Qnap, and IC Realtime The DoorBird D1812 integrates into Doorking 1812 Classic Surface Mount, 1812 Classic Flush Mount, 1812 Plus Surface Mount, and 1812 Plus Flush Mount. All DoorBird intercoms are developed, designed, and carefully manufactured in Germany and comply with the highest security standards.
The number of cyber-attacks on companies, governments, and individuals has been consistently rising in recent years, with global ransomware attacks increasing significantly in 2020, up 485% in compared to 2019. Tackling cybersecurity and protecting key critical infrastructure is key to national security, and the quick pivot to remote working during the COVID pandemic has seen even the most prepared organizations face new security challenges, with cybercriminals quick to take advantage. This is highlighted by research that reveals CEOs are more concerned than ever about cybersecurity vulnerabilities, up to 91% from 80% last year. Alarmingly, nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyber-attacks, despite the fact that they have increased investment in security over the past 12 months. Mitigate cyber threats Highlighting the growing need for cybersecurity readiness and the complex environment security professionals are now operating in, the newly launched International Cyber Expo will open its doors at Olympia, London from 28-29 September – providing invaluable opportunities for face-to-face networking and a chance to discover the latest thinking and solutions designed to mitigate cyber threats. Co-located with the International Security Expo, two industry events under one roof will provide attendees with the perfect platform to identify the very latest technology and services to protect the digital and physical future. Attendees Aimed at Government officials, cyber policymakers, export leaders, and CISOs from around the world, the event will help improve the security and resilience of national infrastructures and business continuity with representatives from the Communications, Energy, Utilities, Finance, Government, Health, and Transport sectors all in attendance. Game-changing products Attendees will meet more than 50 exhibitors as they demonstrate their products and innovative solutions With game-changing products and services on display, attendees will meet more than 50 exhibitors, including Tripwire, Jacobs, Dencrypt, 3M, and Ascentor, as they demonstrate their expertise in Network Protection, Industrial Systems, Endpoint Security, Managed Services, Apps, Mobile Security, Identity & Access Management, Cloud Security, Threat Intelligence, Disaster Recovery and more. Product demonstrations will be staged in the Product Innovation Theatre, where leading brands launching products and services will showcase their innovative solutions. Live cyberattack demonstration Live demonstrations will also take place in the Live Cyber Attack Demonstrator, in association with CrisisCast. Bringing realistic, informed, crisis management and disaster incidents to life, CrisisCast will partner with leading International Cyber Expo exhibitors to deliver a highly immersive, real-time cyber-attack on an eminent retail chain. Incorporating hi-tech stage and film techniques, visitors to the exhibit will be able to see and understand the psychology and motivating factors behind the attack from two perspectives at once – the attackers and the entity’s boardroom. Protection from malware attacks Elsewhere on the show floor, Cyber Griffin will present its award-winning Decisions and Disruptions tabletop exercise designed to explore the decisions that people make in real-life scenarios to protect their businesses from modern-day threats. Fully immersive teams will put to the test as they respond to both hacking and malware attacks, in addition to physical security threats. Professional training The National Cyber Security Centre (NCSC) certified training will offer participants a chance to see first-hand how cybersecurity can affect an organization's turnover, reputation, and regulatory fines while highlighting how cyber and physical security impact each other. Global Cyber Summit The Global Cyber Summit will showcase current and future threats will be put under the spotlight Offering exclusive insights into the most pertinent industry trends, the event will also host the Global Cyber Summit where current and future threats will be put under the spotlight. Running over two days, the program will see a range of globally renowned experts share their knowledge and expertise on a range of topics from serious organized cybercrime, state-sponsored hacking, ransomware attacks, protecting critical national infrastructure, and more. All sessions are CPD-certified and a full program for the two-day high-level summit will be announced in the coming months. Backed by professionals Ensuring the event has a laser-like focus on the issues facing us now and in the future, an impressive panel of 27 renowned industry experts have joined the International Cyber Expo Cyber Advisory Council and will share their experiences and knowledge with the show organizers. Chaired by Professor Ciaran Martin, former CEO of the National Cyber Security Centre and professor at Oxford University, the panel also includes Richard Benham, Global Expert in Data Management, Artificial Intelligence (AI) and Cyber Security, Foreign and Commonwealth Office; Paul Chichester, Director of Operations, National Cyber Security Centre (NCSC); Lisa Ventura, CEO & Founder, UK Cyber Security Association (UKCSA); and Henry Pearson, Cyber Security Ambassador, and UK Defence and Security Exports, Department for International Trade (DIT), UKDSE. Engaging in cybersecurity solutions Professor Ciaran Martin, the former CEO of National Cyber Security Centre, commented, “In this year of all years, keeping the cybersecurity community together is more important than ever. Continued engagement across the industry and between industry and Government, and with friends and partners across the world, is what will keep us safer as we grow ever more dependent on technology and the events industry is vital to this.” “I am delighted and honored to be asked to chair the Cyber Advisory Council and look forward to supporting, adding value, sharing knowledge, and shaping the future of these essential cyber events.” The event will provide insights and solutions to improve the security and resilience of business and critical infrastructures Cybersecurity awareness International Cyber Expo, Event Director Rachael Shattock said, “With growing investment and awareness of cyber capabilities, never has there been a more important time to understand the convergence of the physical and cybersecurity sectors, and the solutions required to help security professionals protect our nation and secure our networks.” “With unparalleled insights from our Cyber Advisory Council, our event will provide exclusive insights and the latest solutions to improve the security and resilience of business and critical infrastructures.”
According to a recent wide-ranging article on data security in Computer Weekly: “physical security is key to maintaining the resilience and effectiveness of data centers… businesses end up exposing themselves to a range of risks in this area of security is ignored.” A lack of investment in the physical security of servers undermines the cyber-security of data assets and vice versa. Appropriate physical security controls manage risk by minimizing unauthorized access to servers. They protect against outsider intrusion and so-called “insider threats”, as well as accidental breaches and damage to server hardware. Improved data protection Aperio wireless locks fill a critical part of this holistic security picture: They protect valuable data by filtering physical access to servers. Server racking solutions may have different locking set-ups, so the Aperio product range has two lock types to accommodate this. Aperio KS100 Rack Lock The Aperio KS100 Electronic Server Rack Lock provides comprehensive, wireless control and monitoring for racks and cabinets, incorporating sophisticated tamper protection. Optional online integration adds real-time control and locks status change alerts Optional online integration adds real-time control and locks status change alerts. The KS100 can be deployed wirelessly, either on-site or in a co-located data center, and integrated seamlessly with an existing access system. C100 Rack Cylinder The C100 Electronic Server Rack Cylinder has a straightforward design suited to many types of server cabinets. It is wire-free and easy to fit, with no drilling or cabling at the cabinet: Installers simply swap an existing mechanical cylinder for this Aperio device. It is compatible with keyless access using any standard RFID technology and plugs straight into an access control system without complex database integration. Inbuilt RFID scanning In addition to server rack locking, Aperio electronic door devices ensure only authorized staff and contractors even enter the server room itself. Battery-powered cylinders, escutcheons, security locks, and a wireless handle with an inbuilt RFID reader — all available for multiple door types and formats — provide key-free access control to keep potential threats away. Certified wireless locks are available for perimeter doors, too, further extending control and protection. Certified wireless locks are available for perimeter doors further extending control and protection These devices are designed for seamless integration with all kinds of security management systems. Aperio enables facility and data center managers to extend the reach of electronic security without replacing an existing system or creating unnecessary workload by running separate systems in parallel. On-demand audit trail capabilities tell security managers exactly who accessed any server and when. Layered physical security Aperio provides this critical layer of data security cost-effectively for an increasingly multi-layered security landscape, ensuring a deficit in physical protection does not leave the door open for onsite intruders or cyber-criminals. The right access control technologies make it easy for the right people to reach an organization’s servers — and keep everyone else out.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
Exeter Science Park is a business park developed by the Exeter Science Park Company, a partnership between Devon County Council, the University of Exeter, the Exeter City Council, and the East Devon District Council. It is a 26-hectare site located on the outskirts of the city of Exeter next to junction 29 of the M5 freeway. Sustainable solution The site has 2 entry lanes and 3 exit lanes. A vehicle access control solution was required to resolve problems at these entry and exit points. It was necessary to reduce staff involvement in barrier control, relieve congestion at the barriers, and improve reporting data using a sustainable solution that has low maintenance costs. Long-range tag reader Upon approach to the entry barrier, the uPass reader senses the RFID tag Each entry and exit lane has been fitted with a barrier, an HD ANPR camera, and an uPass long-range tag reader. The tag reader is used as the primary method of access control. Staff members will attach their RFID tags to their windscreens. Upon approach to the entry barrier, the uPass reader senses the RFID tag. The uPass Reader passes the information the barrier control, which opens the barrier. The whole process takes approximately 3 seconds. The same procedure is used on the exit barriers. HD ANPR cameras For staff that don’t have RFID tags and visitors, a secondary system using HD ANPR cameras provides access control. This removes the need for any ticket issue/chip coin at entry, avoiding human involvement and resulting in a faster throughput on entry and exit. Further staff and tenants can be added to a limitless categorized white list using the vehicle license plate as the ID. The white list can be used to allow automatic entry of visitors without the driver having to press the intercom button. Benefits Cost-effective and reliable hands-free access control Windshield tags are read at up to 5 meters Prevents unauthorized vehicle access Allows vehicles to be tracked “The uPass long-range tag reader has allowed a quicker throughput through the barrier while improving security on vehicle access. We are extremely happy with the positive impact the product has had on our client,” said Mustafe Omar, Business Development Manager, Newpark Solutions.
Swiss Arabian is the pioneer of Arabian perfumes that spans over 40 years. Over the years, the Swiss Arabian Perfumes Group has grown from strength to strength. It stands tall as the first perfume manufacturer in the UAE. They operate five modern manufacturing facilities spread across an area of 165,000 sq. ft., producing more than 35 million perfumes annually and export the same to over 80 countries. Centralized data management Swiss Arabian has a prominent presence across several cities in the UAE. Considering this, centralized data management of the employee attendance details, from all the units was critical. Besides, overtime calculation and managing rollover shifts were tedious tasks as well. Furthermore, verifying the attendance data with detailed reports, bifurcated by locations was a part of their key requirements. Matrix addressed these challenges by proposing a door controller at each location Matrix addressed these challenges by proposing a door controller at each location, connected via a centralized platform, COSEC CENTRA, to manage all the data, from one place. This Time-Attendance solution assists them in procuring accurate attendance details of an employee in no time! Through the web-based employee portal, the solution offers efficient leave and shift management. Furthermore, it helped the HR team to generate customized reports in the most efficient manner. Effortless attendance management Results obtained after the installation: Centralized and effortless attendance management of multiple locations. Streamlined shift allocation and automated shift correction. Customized attendance policy formation. Real-time alert on attendance event. Auto-scheduled reporting. Efficient employee database management. Improved productivity. Products offered for installation COSEC VEGA FAX - Fingerprint and card based door controller with Wi-Fi and internet connectivity options. COSEC DOOR FOT - Optical fingerprint and RFID card based door controller for time-attendance. COSEC PATH DCFM - Optical fingerprint and RFID card based door controller for time-attendance & access control. COSEC CENTRA PLT - Application software platform. COSEC CENTRA ESS - Employee self-service portal for attendance management. COSEC CENTRA TAM - Time-attendance and leave management module for COSEC software platform. COSEC CENTRA ACM - Access control application software for enterprises.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernize two buildings, university managers sought a retrofit-ready access control solution to upgrade security. University administrators selected Aperio® locks to secure doors in the new buildings. With Aperio, facilities staff deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily workload with mechanical locking — vanishes. The Luminy campus is now equipped with 372 Aperio Electronic Cylinders & 42 Aperio Electronic Handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly, and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas — especially those with computers. Individual access smart-cards “Since we installed Aperio, we have not had a break-in,” says Cédric Lopez, Maintenance Manager at Luminy. An easy extension for room management and scheduling. In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Access permissions and campus traffic Aperio devices are integrated online for a live overview of the campus that helps respond proactively to incidents Luminy’s security team has complete control over access permissions and campus traffic — in real-time. Because their new Aperio devices are integrated online, staff see a “live” overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. Integration with the scheduling system Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cédric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real-time. Aperio beyond safety & security Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how one can upgrade and streamline security at ones campus.
SATO, a global company in the development of auto-ID and labelling solutions, has announced the launch of its innovative TEMPCHECK TouchFree solution to enable a 100% contactless approach to verify the identity, health, and safety of all on-site employees and visitors. The fully automated solution combines a tablet device, which has facial recognition and temperature scanning capabilities, with the SATO CT4-LX intelligent label printer to facilitate triple confirmation at the point of entry. With full track and trace capabilities, the TEMPCHECK TouchFree solution records and stores data electronically, deleting it after a set period of time to comply with HIPPA and GDPR policies. Rapid and accurate solution The TEMPCHECK TouchFree solution from SATO is designed to protect, prevent and limit the spread of infection Paul McIntyre, Industrial & Retail Sales Executive at SATO, said, “The health and safety of employees and visitors at any workplace or venue should always be a top priority. Now, with the COVID-19 pandemic, it has become vital that entrance points should become the focal point of information gathering to ensure the safety and security of all those in the building.” “The TEMPCHECK TouchFree solution from SATO is designed to protect, prevent and limit the spread of infection, should an outbreak occur. Not only can our technology help to identify which entrance the individual arrived from, but it can also pinpoint who was in front and behind the person in a line, alongside where they are seated in a stadium environment. This means it can rapidly and accurately identify any potential infection cluster, with all data firmly secured in a local network requiring zero cloud access.” Contactless solution To use the TEMPCHECK TouchFree solution, individuals simply scan a QR, NFC, RFID, or barcode and allow the device to scan their face – with or without a mask – to verify their identity. Their temperature is then recorded and sent via Bluetooth to the label printer, which displays their name, date, time entered, and their assigned location in the building on the printed label. The label also features a QR code that can be scanned by any peripheral device for ID checking and access rights. “At SATO, we continuously strive to innovate with ceaseless creativity,” added McIntyre. “Our contactless auto-identification and temperature checking solution is a superb replacement for the thumbprint, palm print, or keypad entry systems that are required as part of overall security protocols, as well as health and safety regulations. Its end-to-end touch-free access, combined with data gathering and secure retrieval, makes for a value-added solution that is ideal for large corporate, sporting events and more when physical social restrictions lift.”
BIRD Aerosystems, the globally renowned developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, has been awarded a new contract by the Czech Republic Air Force. Under the contract, BIRD Aerosystems will provide additional AMPS-MV systems with the patented MACS (Missile Approach Confirmation Sensor) for the Czech Air Force’s Mi-17 fleet. This project is a part of the overall modernization plan of the Czech Mi-17 transport helicopter fleet. AMPS-MV systems with patented MACS BIRD’s AMPS are already operational on the Czech Air Force Mi-17 helicopters and have been successfully deployed in different conflict zones, including Afghanistan. This contract comes after BIRD Aerosystems having conducted an overall upgrade to the Czech’s existing AMPS systems earlier this year, which provided enhanced functionality to the MILDS UV detection sensors and the MCDU Mission computers. As part of the current contract BIRD Aerosystems will provide the Czech Air Force its AMPS systems with the MACS sensor, which ensures that no false alarms will be detected and the system will react only to validated real threats. Ronen Factor, the Co-Chief Executive Officer and Founder of BIRD Aerosystems, said “We appreciate the confidence placed in our AMPS solution by the Czech Air Force, who decided to purchase additional systems for its Mi-17 fleet. Equipped with BIRD’s AMPS-MV solution with the MACS sensor, they can rest assured knowing that their aircraft and crew are safe, even when flying in automatic mode in the most complicated conflict zones.” Airborne Missile Protection System The AMPS system is known to automatically detect, verify, and foil missile attacks BIRD Aerosystems’ Airborne Missile Protection System (AMPS) provides the most enhanced protection for military and civilian aircraft against all known Surface to Air Missiles (SAM), including MANPADS, laser beam rider threats, and radar-guided missiles. The AMPS system is known to automatically detect, verify, and foil missile attacks through the effective use of counter-measure decoys (flares and chaff) that jam the missile’s IR (Infrared) seeker and protect the aircraft. MACS (Missile Approach Confirmation Sensor) MACS (Missile Approach Confirmation Sensor) is an advanced semi-active confirmation radar, which significantly reduces the false alarm rate of the overall missile warning system. Queued by a suspected threat, MACS points towards it and performs a doppler-based interrogation to confirm the existence of a valid threat. By doing so, MACS provides the most effective filtering of all known natural and human-made types of false alarms that are typically detected by electro-optical sensors, and ensures that only real missiles will be declared by the system and reacted upon. Fully operational, BIRD’s AMPS-MV with the MACS sensor is provided as a turn-key solution that includes design, installation, integration, certification and support, and is certified by major aircraft manufacturers.
Access IS, part of HID Global, is delighted to celebrate the successful launch of contactless payments across the Stockholm region by SL (Storstockholms Lokaltrafik). Building on the successful mass deployment of Access-IS ticket readers and validators back in 2019, the latest upgrade to the system sees Access-IS devices in train gates and ticket offices as well as bus mounted validators being upgraded to permit full cEMV contactless payment capability. Contactless ticketing Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read Stockholm is leading the way with this deployment of contactless ticketing across a true multi-modal transit network. Barcode and NFC tickets, as well as bank and credit cards by VISA, Mastercard or American Express are all presented to a single, intuitive-to-use, point of presentation. Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read, meaning passenger throughput is maximized for a great user experience and reduced operational costs. Access IS transit validators and readers Common to many Transit Authorities, SL continues to operate its ‘Accesskort’ proprietary closed loop ticketing scheme in tandem with the new upgrade. However, plans are in place to migrate ‘Accesskort’ to a new SL transit (EMV technology) closed loop card, which will be read/processed on the Access-IS reader, making a single point of presentation for all tickets and payments. All of the Access IS transit validators and readers are non-proprietary, open architecture units, which free the city to use any software backend system they desire. Access IS and SL partnership When Access IS first started to work with Storstockholms Lokaltrafik (SL), it was the beginning of a journey to modernize ticketing across Stockholm. At any ticket reader on buses, metro barriers, commuter trains and boats, rail or tram platform, or with the tram conductor, passengers can now simply tap to make a payment using all major payment schemes, as well as Apple Pay, Samsung Pay, Google Pay via their mobile devices’ digital wallet. A single tap buys them a single trip, priced at SEK 38, the same as the SL app, the ticket machines, or the ‘SL Accesskort’. Initially the system has gone live with adult tickets, but concession tickets for pensioners, students or children will follow. Contactless cards for passengers For passenger security, SL does not see debit card numbers or card account The ticket becomes valid the moment a passenger taps on their contactless card for the first time, at the start of their journey and remains valid for 75 minutes. All of a passenger’s journeys are tallied up and debited as a single payment the following day, making travel payments easy to understand and simple to track for the passenger. For passenger security, SL does not see debit card numbers or card accounts, but uses a technology where the correct card number is exchanged for a random number. This means that SL cannot see which person the payment card is linked to. Deployment of contactless transit payments Speaking about the project, Charlotte Modig, Payments and Cards Senior Business Manager for SL Stockholm said, “As we modernize our ticketing system to be leading edge, the learning curve for all involved is steep. Close cooperation between SL and Access has managed to overcome challenges and deliver a service we are all rightly proud of.” Speaking about the project, Cliff Hunter, Head of Sales for Access IS said, “Our relationship with SL goes from strength to strength with a great deal learnt on all sides during this ‘the largest of its kind’ deployment of contactless transit payments.” Cliff adds, “We champion software agnostic transit products to give operators flexibility in how they implement their mobile ticketing and payment schemes.”
Round table discussion
In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Smart And Reliable Rail And Metro OperationsDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload