Actuate, the globally renowned provider of automation and intelligence software for smart security camera systems, has announced that it has closed its Series A financing of US$ 8 million to expand the capabilities of its computer vision technology and build on the company’s growing portfolio of customers. The funding round was led by Tribeca Venture Partners and joined by Scribble Ventures, OCA Ventures, and Context Ventures, with additional support from existing investors, including Bli...
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
SALTO access control hardware has achieved a huge milestone in having its SPACE readers and controllers certified to EN 60839 standard. This important standard provides guidelines for those responsible for establishing and planning an electronic access control system (EACS) both in terms of levels of protection and levels of performance necessary to provide the degree of physical access (entry and exit) access control and protection considered appropriate for an installation. Products certifie...
With pupils in the UK set to go back to school on 8 March, there are a number of safety measures schools need to implement to ensure the health and wellness of the staff, students, and school communities. The first lockdown and closure of schools brought on by the coronavirus pandemic fired a “warning shot” for education facilities managers, forcing head-teachers to re-examine school safety standards. Now that a third lockdown is here and schools have been shut down for a sec...
National systems integrator, IES Communications, LLC, a subsidiary of IES Holdings, Inc., has added the Alcatraz Rock autonomous access control solution to its security technology portfolio. IES Communications has selected the Alcatraz Rock to leverage the latest in biometrics – facial authentication – which is more secure and more hygienic, as it reduces touchpoints. “IES is always striving to bring safe new ways to utilize cutting-edge security solutions to its customers. W...
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of EAGL Technology to its Managed Security Service Provider Program (MSSP). EAGL Technology is a manufacturer of indoor/outdoor IoT wireless gunshot sensors, as well as sensors that can detect vape, car collisions, flood waters and critical infrastructure failures. Active shooter threat detection “EAGL produces solutions that address today’s real-world securi...
Understanding access control technology has surpassed its core application as a security tool and is helping protect individuals from infection, Anviz has announced the release of a strategic addition to its product line, Go Touchless - FaceDeep 5 and FaceDeep 5 IRT face recognition terminals. Safely Returning to work and school during the post COVID-19 pandemic period leaves people with a key question - With what health and safety precautions? AI-based facial recognition terminal Anviz has introduced an AI-based face recognition terminal with mask and temperature alerts Anviz has introduced an AI-based face recognition terminal with mask and temperature alerts, equipped with a dual-core based Linux CPU and the latest BioNANO deep learning algorithm that enables it to recognize a face with accuracy and greater speed. According to Mr. Felix Fu, Product Manager at Anviz Global, the dual camera for live face detection and mask, temperature alert are the key features of the Anviz touchless series that will make students and employees follow rules to wear masks during this period. Integrated with CrossChex access control software Furthermore, combined with the latest time attendance and access control management software - CrossChex, Anviz offers the total solutions to enforce rules that require masks and normal body temperature to access entry. With easy installation and multiple authentication options, the AI-based facial recognition device can be used at public buildings, government facilities, educational institutions, hospitals, professional service firms, and retails. FaceDeep Series access control terminals As global demand for hygiene safety and enhanced protection is increasing, Anviz FaceDeep Series access control terminals will provide the best solution to reduce the worries of people returning to office and school, during the post COVID-19 pandemic age.
Heavily used interior and exterior doors need an access solution that’s both robust and intelligent. The new SMARTair i-max Escutcheon from ASSA ABLOY ensures only authorized users pass through these doors, via a range of credentials including virtual keys stored on a smartphone. Fast, wire-free installation makes it easy to implement or extend a SMARTair access control system in any building. This new wireless escutcheon with an inbuilt RFID reader and Bluetooth compatibility handles the punishment of high-traffic, frequent-use doors. It meets standard EN 1906 Category of use: Grade 4 for robustness — the highest level, recommended for doors ‘which are subject to frequent violent use.’ Wire-Free installation This hard-wearing, resistant build quality makes the SMARTair escutcheon ideal for busy doors at education establishments like universities and schools; healthcare sites including hospitals and nursing homes; offices and co-working spaces; apartment complexes and multifamily residences; and public institutions like government buildings, sports centers, and libraries. Its robust design, redefined aesthetics and wire-free installation are perfect for these high-traffic environments — facilities with busy students and teachers, or doctors, nurses, visitors, and subcontractors always on the move. The SMARTair i-max escutcheon is also available with an antibacterial coating, for healthcare and other sterile settings. Proximity credential technologies The new escutcheon is battery powered and works with all standard proximity credential technologies The new escutcheon is battery-powered and works with all standard proximity credential technologies, including MIFARE®, DESFire, and iCLASS®. An optional integrated PINpad provides the opportunity to add another layer of security with multi-factor authentication. One can specify individual doors to open with PIN verification or credential verification — or to require both. The new i-max sacrifices none of its style in pursuit of functionality. The new escutcheon comes in a variety of contemporary finishes and handles options — with up to 16 different combinations. A multi-colored LED gives visual warning signals at a glance. This new SMARTair escutcheon fits glass, wooden, or aluminum doors — including fire and emergency exit doors — and is available for Scandinavian, Euro, Finnish, and Australasian door profiles. System management options The new escutcheon is compatible with all SMARTair system management options: Standalone, for basic access control functionality; Update on Card; Openow and Pro Wireless Online, for real-time management of every door and system user. The i-max escutcheon also offers another way to open doors: the SMARTair Mobile App to open doors remotely and the SMARTair Openow mobile app. With Openow, users no longer carry a separate card or fob credentials. Instead, their smartphone stores secure virtual keys which can be issued, amended or canceled at any time. So, users no longer need to waste time collecting, or validating an access card to open doors locked with a new SMARTair i-max escutcheon. With Openow, if one has their phone, they are already carrying the keys.
Dahua Technology, a front-runner video-centric smart IoT solution and service provider, is proud to announce that the Dahua Global Virtual Innovation Center is now available to its global customers. By demonstrating its latest technologies, products, and solutions through an online virtual showroom, the center can support customers in designing excellent security systems. Due to the drastic impact of COVID-19, people are having difficulties in gaining access and experiencing the development of products and technologies in their field of interest while keeping themselves safe and healthy at the same time. AIoT future Browse the most up-to-date security technologies, products and solutions from the comfort and safety of ones home or office As an innovation-driven company, Dahua Technology stands against the difficulties and challenges brought by the unprecedented pandemic by fully embracing digital transformation. The company launched the Dahua Global Virtual Innovation Center in order to drive innovation to an AIoT future. No matter where one is, one can simply browse the most up-to-date security technologies, products and solutions from the comfort and safety of ones home or office, and get resources and knowledge that can help one with ones next security project. Benefits that the center offers Browse the latest technology wherever one are 24/7 Broad range of products and vertical industry solutions on display 360-degree eye-catching product showcases available in VR Download product datasheets, images and other information directly to ones device Additional features With the Dahua Global Virtual Innovation Center, one can learn about the up-to-date products and solutions of Dahua Technology in an economical and safe manner. Moreover, one can also simply click a button to mark the products that interest one as favorite, as well as send emails to request for more information. With its mission of “Enabling a Safer Society and Smarter Living”, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve its partners and customers around the world.
SALTO Systems, front-runners in wire-free networked, wireless, cloud, and smartphone-based access control solutions; announce that the SALTO Neo electronic cylinder is their latest product to gain the coveted BSI Enhanced Level IoT Kitemark™ for access control systems. Designed for doors where fitting an electronic escutcheon is not possible or required, the compact SALTO Neo Cylinder can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. It’s also available in an extensive range of models, including a new tough next-generation electronic padlock, and is suitable for use on almost any kind of door from Europe to ASIA to the Americas. IoT security IoT is a network of smart devices and systems when connected, enables the exchange of data to provide services, efficiency, and innovation BSI (British Standards Institution) has been part of this collaborative work to give clarity on best practices for IoT security, subsequently developing a scheme to assess connected/IoT devices. The scheme determines whether a product has the appropriate security controls for its intended use and is suitably supported throughout its intended life. This cyber/physical security scheme forms the security element of the BSI Kitemark for IoT/Connected products. The IoT is typically a network of smart devices and systems that can be connected, enabling data to be exchanged to provide services, efficiency, and innovation. Its technology can positively enhance lives and businesses, but the complexity of IoT also means that those of criminal intent may attempt to access it to steal data, hack cameras, enter buildings or otherwise breach security. Advanced security testing Like the already approved XS4 One electronics locks product family and BLUEnet wireless peripherals, SALTO controllers, and readers, to achieve certification the SALTO Neo family of electronic cylinders had to undergo advanced security testing for vulnerabilities and security flaws in BSI’s state of the art IoT laboratory enduring BSI’s most in-depth and exacting testing and analysis. The SALTO Neo Cylinder provides an effective and convenient way of securing a building or assets. The clutch system is energy efficient, dropping power consumption to impressively low levels resulting in 100,000 / 130,000 operations from just one set of batteries. Standby power consumption is also reduced, further extending battery life. IP66-rated and certified Now IP66-rated, the SALTO Neo Cylinder is weather-resistant, making it especially suitable for outdoor use, even in the harshest of environments. Inside the tough SALTO Neo Cylinder exterior is the latest in electronic lock technology. Certified to the highest security standards, and incorporating ever-higher quality and reliability, the SALTO Neo Cylinder offers value far beyond security, however. It also provides greater control over the door by offering users access to audit trails, reports, alerts, and much more. SALTO Systems Limited MD Ramesh Gurdev said, “We’re proud that our SALTO Neo cylinder family now holds both ‘Secured by Design’ accreditation and IoT Kitemark™ status as both are increasingly important in the specification of access control systems. The award means we now exceed the market standard for a number of security products across our access range which provides SALTO customers with confidence that they are buying one of the most secure products available on the market today.”
The Genetec Channel Partner program has partnered with Credly to award verified digital badges to European channel partners who complete Genetec certification courses. Badges provide an easy way to share and validate the skills, experience, and technical knowledge. Digital badges are the best tool to highlight Genetec certifications and achievements on the website, social media, profiles, and more. Think of the badges as a bonus for the hard work—there's no extra cost involved. What is a digital badge? Genetec has included digital badges in their training programs as an additional way for certified partners to share and validate the achievements. These digital credentials can be used in the website, email signatures, and on social media sites such as LinkedIn, Facebook, and Twitter. It provides a secure and verifiable way to share professional skills and abilities. A digital badge consists of an image and metadata that are uniquely linked to the person and his/her achievements. Why get a digital badge? Digital badges are a web-enabled version of the paper certificates They give one recognition for learning new skills It is a more efficient way of displaying the training achievements on ones social media profiles The Credly platform uses a trusted method for real-time certification verification Genetec digital badges are awarded free of charge (after one passes the skills assessment exam).
Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organizations to replace a non-FICAM compliant system or to secure a new site were restricted to a limited choice of proprietary solutions. Because Security Center Synergis is a FICAM-approved open platform access control system, customers can choose from a range of non-proprietary choices to efficiently validate Personal Identity Verification (PIV, PIV-I, CAC, and TWIC) for federal employees and contractors. Cost-effective solutions “By bringing these new non-proprietary options to market with partners such as Veridt, HID, and Mercury, we are offering government customers a choice of simple-to-deploy and cost-effective solutions so that they can easily comply with FICAM requirements while leveraging the most robust and extensible software solution on the market,” said Justin Himelberger, Enterprise Systems Business Development Manager, Federal & DOD at Genetec. Access management solution Veridt Stealth Series™ readers provide a full complement of capability enabling identity and access management solutions for traditional and trusted PACS using PIV, TWIC, and CAC based credentials. This family of readers encompasses both biometric and non-biometric configurations while offering fixed, wireless, and mobile platforms. Veridt readers are well known for their compact design and operating capability in the harshest environments. Identifying federal standards “We are pleased to work with Genetec to offer our joint US-Federal market customers FICAM-compliant solutions that will enable them to comply with the most stringent access and identity federal standards as well as the flexibility to maintain and protect their investment for years to come,” said Bryce Lamers, Director of Sales and Marketing at Veridt.
For decades, the nature of global safety has been evolving. From physical security threats like large-scale terrorist attacks and lone actor stabbings to chemical threats such as the Salisbury poisonings and even microbiological threats such as COVID-19, new challenges are constantly arising and the threat landscape we operate in today is constantly changing. Compounding the complexity of the security issues is the complexity and nature of attacks. With the economic downturn, there is the traditional rise in theft, violence and other crimes. Compound this with unmanned businesses and work-at-home staff, and there is a perfect storm for a rise in security threats. Artificial intelligence (AI) and specifically the branch of AI known as machine learning (ML), was already causing widespread disruption in many industries, including the security industry. AI has been a driving force to replace labor-based business models with integrated data and actionable intelligence that is context-aware. It has become apparent that AI will play a big part in the ongoing fight against both pandemics such as COVID-19, as well as other threats that we may face in the future. With all of this in mind, 2021 is poised to be a big year for AI growth. While AI is going to continue to impact our lives in dozens of ways, from smart sensors to face mask compliance detection, the following reflects a few top trends and challenges that I have my eye on for 2021 as we close out this year. The rise of smart city investments One such example is the increasing development of smart cities and how AI can be leveraged to build safe communities. To date, we’ve seen an increase in the number of smart city programmes around the globe; cities that are beginning to deploy innovative technologies for the management and ease of life services. Compounding the complexity of the security issues is the complexity and nature of attacks Typical development of a city includes standard infrastructure - roads, schools, power, water, transportation. Now, internet, data and AI capabilities are part of the standard infrastructure requirements for all new developments. AI promises to deliver increased efficiencies with the infrastructure that will accommodate growing populations while reducing our impact on the environment, resources, and communities. Global cities now account for more than half of the world’s population, and the United Nations projects the number to balloon to 68% by mid-century. Owing to both demographic shifts and overall population growth, that means that around 2.5 billion people could be added to urban areas by the middle of the century, predicts the UN Department of Economic and Social Affairs (DESA). With an increase in population has come an increase in global spending on smart city initiatives to drive down the impact of growing urban concentration. Global spending on smart city initiatives is expected to total nearly $124 billion this year, an increase of 18.9% over 2019, according to IDC's Worldwide Semiannual Smart Cities Spending Guide, while Singapore, Tokyo, London and New York as the big spenders - expected to spend more than $1 billion in 2020. Using AI-driven technology to create safer public and private spaces Today, security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments to protect the population in a more efficient, and accurate manner. As we look ahead to the future of public safety, it’s clear that new AI technology can dramatically improve the effectiveness of today’s physical security space. One such deployment is the use of video object recognition/computer vision software that can be integrated into existing video monitoring security (VMS) systems. These enhanced VMS systems can be deployed both inside and outside of buildings to identify risks and flag threats, such weapons, aggressive behaviours, theft, and safety compliance. This helps to minimize the impact of a breach by an early alert to onsite security in real-time to the location and nature of the potential threat, allowing them to intervene before a loss occurs. These same AI-enabled video solutions can similarly be used to provide advanced business operations in retail, logistics, and manufacturing organizations. Multi-sensor security solutions Also, targeted magnetic and radar sensor technologies, concealed in everyday objects like planter boxes or inside walls, can now scan individuals and bags entering a building for concealed threat objects. Using AI/machine learning, these two sensor solutions combined can identify metal content on the body and bag and match the item to a catalog of threat items, such as guns, rifles, knives and bombs. Security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments Without this advanced multi-sensor solution, it becomes nearly impossible to discover a weapon on a person's body before it appears in an assailant’s hands. This multi-sensor solution allows for touchless, unobtrusive access to a building, but allows for immediate notification to onsite security when a concealed threat is detected. The hidden technology thus empowers security staff to intercept threats before they evolve into a wider scale attack, while also maintaining the privacy and civil liberties of the public, unless, of course, they are carrying a concealed weapon or pose a physical threat. With the advent of sophisticated surveillance and technological innovation, a level of caution must be exerted. Despite the ongoing global debate, there remains little regulation about the use of AI technologies in today’s physical security space. One thing is certain; it must be deployed in the right place, at the right time, with the right privacy and civil liberty protection objectives. People don’t want to be protected by omnipresent, obstructive and overbearing security systems that infringe on their privacy and civil liberties. They want a proper balance between security and their current way of life, one that must be fused together. Technology and tracing COVID-19 Machine learning-based technologies are playing a substantial role in the response to the COVID-19 pandemic. Traditionally, the key purpose of surveillance systems has been to detect and deter threats, including the detection of visible and hidden weapons and abnormal behavior. While this, of course, remains a primary focus, today we are seeing how surveillance systems defend against new invisible threats, as well as rapidly automate the process of contact-tracing to capture and contain a virus before it spreads. Again, the ability to track and trace through parsing algorithms that can manage through enormous amounts of data provides a highly scalable and rapid response mechanism to control the spread of threats. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact Although the threat may not be visible, it is just as destructive. By incorporating AI into existing technologies, government, healthcare and security professionals can monitor public spaces and environments through the combined use of digital and thermal video surveillance cameras and video management systems); just one of the solutions being explored. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact. By Using AI-powered video analytic software, businesses can monitor face masks, social distancing and large gathering compliance and also detect elevated body temperature. Critically, technology must be capable of both identifying and tracking the virus but also be unobtrusive. An unobtrusive system that is adaptable enough to be deployed across a range of environments where the public gathers in enclosed spaces is necessary to be effective. Security in 2021 Technology has proven itself to be a valuable ally in times of crisis. For smart cities, the use of innovative AI/machine learning technologies will help optimize security solutions in areas that are brimming with potential. As we look ahead to the future of security in a world that is impacted by such a wide range of threats, from physical to chemical to microbiological, it’s clear that new technologies, specifically AI can dramatically improve the effectiveness of security systems and help us to better defend against a wide spectrum of threats. Technology has a huge role to play in making our communities safe in 2021 and beyond, but for security systems to be effective, they must not be oppressive or obstructive. This will ensure they have the full support of the public - the key to success.
Schools play a key role in shaping our future. Following the reopening of classrooms up and down the country, young minds are returning to some normality. Once again they're being inspired, learning useful skills, and forging new interests to ensure our country's continued prosperity. Schools need a comprehensive security infrastructure to protect the children who attend them. Most notably, secure perimeters that keep unwanted people out, but also ensure visitors, parents, and students alike can access their shared community space without feeling segregated or unwelcome. Robust boundary fencing However, although safety is often the primary concern of parents, with tighter budgetary constraints and funds prioritised to make schools COVID safe, it can be all too easy to let important perimeter replacement or improvement programmes slip. The purpose of boundary fencing is to restrict unauthorized entry and exit The purpose of boundary fencing is to restrict unauthorized entry and exit from school grounds, and should be specifically designed to be fit for purpose. Opting for fencing with a welded pale-through-rail construction and concealed anti-tamper connectors between fence panels and posts delivers a robust boundary that's virtually impossible to break through. This style of fencing also gives a better finish with no visible joints or unsightly bolts. Attractive and practical solutions Unlike generic riveted palisade fencing, this solution is both attractive and practical, more so now that LPS 1175 SR1 certified and Secured by Design versions are available. The style of fencing should meet a school's desired security and safety requirements, simultaneously, it should not compromise on aesthetic considerations. As part of the public face of the school, it should be attractive as well as functional, helping overcome any concerns of creating a prison-like environment and promote a sense of well-being. It's recommended that perimeter fencing should be: a minimum of two metres high, vandal-resistant and sturdy, grounded on a hard surface, challenging to scale, and have an anti-climb topping, much the same as a high-security option. Access all areas Each educational site must consider the number of necessary entrances A perimeter fence requires secure access points and gates. Each educational site must consider the number of necessary entrances. These should be kept to a minimum, to make it easier to maintain control of visitor movement. However, in larger schools this is not always possible and additional entrances may be required to prevent potentially dangerous congestion at the start and end of the school day. Furthermore, separate gates must be installed for vehicles and pedestrians to ensure they are kept at a safe distance, and avoid unnecessary openings of large, double leaf gates. All access points should be locked during the day to keep students on-site and prevent intruders from gaining access to school grounds. Gates should ideally be matched in design, height and construction to the fencing, to prevent creating vulnerable areas and compromising security. Automatic vs manual While automatic gates offer more control, manual gates shouldn't be overlooked. Not only are they easier to install and usually cheaper than automated gates, but they also don't rely on power, so if your site's supply is cut off, they provide a hassle-free exit. Furthermore, gates that are only used at the start and end of the day can be easily locked manually by staff. However, automated gates do offer welcome flexibility, as they include access control devices such as remote controls, keypads and card readers, which will also increase the school's security. They're also robust and heavy, meaning it's incredibly difficult to force them open. Electric gates offer additional versatility with a choice of either full automation, or a hybrid of manned and automatic security, with staff able to allow visitors access via intercom or video system. Securing outdoor facilities It’s also essential to consider outdoor areas when it comes to specifying security options for educational environments. Specialist security fencing should be specified where recreational areas double up as the school’s boundary fencing. The security of the site's sports facilities will also need to be considered. Commonly known as MUGAs (Multi-Use Games Areas), enclosures can be designed with specialist mesh systems to allow multiple sports to be played in the same location while providing safety to participants, spectators and buildings. When it comes to play areas in nurseries and junior schools, installing RoSPA approved and BS EN 1176 compliant fencing and gates is recommended. These are available in both timber and steel options and tested for their ability to provide a safe fencing and gate solution - designed to reduce the risk of limb entrapment. Acoustic fencing is also worth considering for these environments, particularly in urban areas or where housing is close to school play areas. It can help reduce incoming ambient noise from neighbouring busy roads, railway lines, or construction sites, and contain the school noise within its boundary. Offering sufficient protection Focus on learning unimpeded by threat The current generation of children deserve an environment where they can focus on learning unimpeded by threat. Schools need robust perimeter solutions that welcome pupils, offer peace of mind to parents, and provide them with sufficient protection against intruders. Ultimately, it's the responsibility of the head teachers to engage in dialogue with knowledgeable security professionals to get the most appropriate and effective security solutions for their school, staff and students.
Look who’s talking about the top issues in the physical security industry in 2019. Our website’s Expert Panel Roundtable discussions in 2019 reflected some of the most timely and important topics in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2019 was about the year before – reviewing what caused disruptions in 2018. The second most popular was about 2019, the year ahead. Other hot topics that made the Top-10 list of roundtable discussions included what makes a good security salesperson, the need for greater cybersecurity awareness, and how millennials are changing the industry. Here is a roundup of the Top 10 Expert Panel Roundtable discussions posted in 2019, along with a “sound bite” from each discussion and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2019 (including the quotable panelists named and linked below). 1. What caused the most disruption in 2018 in the physical security space? “The industry is in the midst of a dynamic technology revolution, and we are seeing increased use of security solutions that leverage machine-based learning, artificial intelligence, and robotics. This past year, the market embraced these emerging technologies, with a myriad of solutions now being embedded with these capabilities, including IP cameras, access control systems, security robots, and drones.” – Travis Deyle, Cobalt Robotics 2. What technology trend will have the biggest impact on physical security in 2019? “IoT (Internet of Things) will continue to make us more efficient. We’re already seeing the increased integration of IoT devices into enterprise-level solutions. The rise in city-living is also putting pressure on infrastructure, so it will become increasingly important for the truly smart and safe city to move beyond a vision into reality.” – Jamie Barnfield, IDIS 3. What are the security challenges of hospitals and the healthcare industry? “Preventing security incidents is a priority and a challenge for healthcare directors. Traditionally, the success of a healthcare facility’s safety program has been equated to the number of issues that warranted a response; though, the simple number of emergency responses is not helpful in preventing the same situations from occurring again.” – Julie Brown, Johnson Controls 4. What characteristics do salespeople require in the physical security industry? “To be a good salesperson, you must understand each customer’s needs and help them solve their problems. In physical security, this need is typically some kind of risk mitigation – guarding themselves and their organizations against threats, danger and liability. This makes the conversation more fraught than if you were selling a business product such as lighting, HR software or insurance, since ultimately you are talking about people’s lives and livelihoods.” – Dave Whitis, Boon Edam 5. How does security technology make our schools safer? “IP-based physical security solutions can help deliver safer environments so that students, staff, and faculty can focus on learning. Video surveillance provides a live and recorded visual representation of what’s happening across a school and can readily be called upon to access important information during an investigation. Electronic access control on doors and barriers not only regulates who goes where, but also provides protection for property and assets.” – Terry Schulenberg, Genetec 6. Is greater awareness helping to increase cybersecurity? “On a daily basis, we hear of widely publicized cybersecurity incidents which affect our customer’s businesses, peace of mind, and assets. This new world is one the physical security industry has not been familiar with. What follows these well-publicized events is frustration and confusion, particularly for small and medium-sized businesses. Confusion then leads to application of ineffective security tools or, worse, inaction.” – Drew Alexander, STANLEY Security 7. What security markets are likely to embrace AI? “Transportation seems to be the market that could benefit the most from embracing artificial intelligence. As it relates to people tracking, AI could single out deviating behavior, such as someone walking against the flow of rush-hour traffic, and in turn could initiate a real-time response so authorities can determine whether or not intervening is necessary.” – Per Björkdahl, ONVIF 8. How are Millennials changing the security industry? “Over the last few years, we’ve seen the Millennial generation have a profound impact on the security industry, and this is largely due to the fact that those born in this time period have a very knowledgeable and in-depth experience with technology. Millennials are accustomed to smart devices, automation and at-your-fingertips accessibility, which has created new and unfamiliar demands when it comes to security systems and solutions.” – Ron Virden, ACRE 9. What are the mainstream uses for thermal cameras? “Thermal cameras have been the go-to solution for perimeter protection applications for decades. This year, we’re seeing more integrations of thermal cameras with other solutions like radar to improve redundancy, long-range detection and alarm verification for airports and other large sites. Thanks to new technology partnerships and thermal offerings, customers are seeing the value of thermal beyond traditional use cases.” – Fredrik Wallberg, FLIR Systems 10. How do software improvements drive physical security? “Software improvements ultimately drive greater interoperability among technology partners and system integration in physical security solutions. From a surveillance standpoint, software is also increasingly used to enhance system performance and overall longevity by identifying anomalies. For example, to ensure video data is preserved and not lost, customers are using health monitoring software on surveillance hard drives.” – Jessica Burton, Seagate Technology
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Ways to manage visitors and improve communications, while keeping doors to the Congregation Beth Jacob’s sanctuary and school locked. Aiphone IS Series video intercom Aiphone IS Series video intercom mounted just outside the main entry allows visitors to buzz one of four master stations. “Emergency communications and procedures are now embedded in our daily operations,” said Greg Sterling, Past President of the Congregation Beth Jacob. Enhancing safety against active shooters In recent years, houses of worship have become an all‑too‑common target for active shooters, burglars and vandals The Congregation Beth Jacob provides a house of worship, pre-school and attached K-7 religious school for the Redwood City, California’s Jewish community, in the heart of the famed Silicon Valley. In recent years, houses of worship have become an all‑too‑common target for active shooters, burglars, vandals and a host of other criminals. Founded in 1930, Congregation Beth Jacob has a rich history as the first Jewish institution built between San Francisco and San Jose. Since an earlier sanctuary was destroyed by a suspected arsonist in 1979, Congregation Beth Jacob has taken security of its members, students and employees very seriously and regularly updates its systems and procedures. Managing visitors and improving communications Congregation Beth Jacob’s security integrator, Oakland-based HighCom Security Services, was asked for ways to manage visitors and improve communications, while keeping doors to the sanctuary and school locked throughout the day. Requirements for the Congregation Beth Jacob included: Sanctuary employees had to be able to remotely see and speak with visitors before opening an exterior door. Employees needed to be able to easily communicate between the 12 classrooms and offices in the sanctuary and school. The solution had to be easy for employees, congregation members and visitors to use. “Emergency communications and procedures are now embedded in our daily operations,” said Greg Sterling, Past President of Congregation Beth Jacob. Fences and gates installed Fences and gates now guide visitors from the street to a rear parking lot and a double-door entry to the main facility. This and all other exterior doors are kept locked. An Aiphone IS Series video intercom is mounted just outside the main entry, allowing visitors to buzz one of the four master stations located on the desks of the Executive Director and Receptionists and in the common areas of the main and school offices. Color LCD monitors on the IS Series master stations allow office staff to see and speak with visitors, before remotely unlocking the door. Keypads at the door let employees open the door by entering a code. Wall-mount audio intercoms Aiphone speakers and horns were added to share emergency messages in the school play area Wall-mount audio intercoms have been provided in each classroom. Teachers can communicate hands-free with the main or school offices, and other classrooms. They can also choose to use the intercom’s handset for more private conversations. Before the intercoms were installed, teachers had to leave the classroom and walk to the office for help. Aiphone speakers and horns were added to share emergency messages in the school play area, two patios, front entry, sanctuary, social hall and main dining room. Surveillance cameras installed Surveillance cameras set to view the parking lot, school entry and the street fronting Congregation Beth Jacob. Sanctuary staff can view live video from monitors in the facility’s main and school offices. Panic buttons were installed in each classroom, the social hall and kitchen. Pushing a button generates a code phrase intended to start an immediate facility lockdown without overly frightening the students.
Secure the main campus building and provide access control and communication throughout the school. Install the IS Series system to ensure all access points into the main building are secure throughout the day. “This is a true, all-in-one solution that provides educational institutions with entry security, classroom communication, paging, emergency call, and access control,” said Ed Maffey President, Maffey’s Security Group. The Situation Founded in 1856, Seton Hall Preparatory School is the oldest Catholic college preparatory school in New Jersey. Educating young men in grades 9-12, the school’s administration aims to provide a safe and nurturing educational environment. Michael Gallo, Assistant Headmaster for Seton Hall Preparatory, admitted the school faced great challenges in properly securing the building, faculty, and student populations. The main campus building in question was built in the 1920s and lacked an automatic door locking system. “We had a situation where all of the doors in the school had to be manually locked and one door would be left unlocked throughout the school day, mainly for faculty access,” Gallo said. “Before employing the Aiphone IS Series, we had to have faculty members keep eyes on all of the hallways to make sure no unauthorized persons had entered the building.” Furthermore, the school was not equipped with an intercom system to communicate between classrooms and the main office, or between the main office and front door. “It created a potentially dangerous situation if a really dire, time-sensitive event occurred.” The Challenge Secure the main campus building and lock all building access points and doors. Integrate new features with the existing paging system and provide audio/video access control and communication throughout the school. The Solution Install Aiphone’s IS Series, a flexible hardwired intercom system with IP capability, to ensure all access points into the main building are secure throughout the day. Achieve reliable communication between classrooms and the main office in emergency situations. The All-in-One Security Solution The IS Series IP Video Intercom installed at Seton Hall Preparatory School is a network-based all-in-one security control system Seton Hall Preparatory School administrators looked toward the expertise of Maffey’s Security Group to correct the campus’ security flaws. “Maffey’s realized the critical nature of the security threat posed by our leaving the front door of the building opens all the time. Thus, the perfect solution was the IS Series system from Aiphone that addressed and solved our challenges with perimeter security, classroom communication, multiple paging zones, bell scheduling, and accessing our paging system from multiple locations,” Gallo said. After consulting Seton Hall Preparatory, Maffey’s recommended installing Aiphone’s IS Series IP Video Intercom. “Here at Maffey’s, we have become full Aiphone supporters and only install Aiphone intercoms,” said Ed Maffey, President of Maffey’s Security Group. IP Video Intercom The IS Series IP Video Intercom installed at Seton Hall Preparatory School is a cost-effective, network-based all-in-one security control system. It features video entry security, internal communication, rescue assistance, paging, and bell/chime scheduling. The door station provides video identification, including a 170° wide-angle camera with digital PTZ (pan, tilt, zoom) control. The IS Series can connect multiple schools or buildings within a district or campus. The system allows for after-hours security, as well as extensive communication between buildings and schools to identify visitors, announce emergencies, program daily bulletins and bell schedules, and connect with classrooms and exterior buildings. IS Series Features: Flexible system size can be small or can scale to a large capacity Can have local hardwired components, IP components, or a mix of both Easy wiring with dedicated CAT-5e cable Integrates with CCTV systems for a broader view of the area Convenient remote door unlocking Keyless entry with embedded card reader stations Seamless System Set-Up The IS Series installation at Seton Hall Preparatory included 60 classrooms, 4 video door stations, 9 paging zones, and 6 master stations to provide the most comprehensive level of security. Minimizing the cost of installation and disruptions for the school, Maffey’s Security Group offered to implement the IS Series system on a voluntary basis during non-school hours. “We worked nights and weekends to complete the install,” Maffey said. “During this time, we were able to install all of the room stations and wire mold in the classrooms and offices. We also integrated the IS Series with a new, audio/ video access control and card access system for authorized personnel on the four perimeter doors.”IS Series rescue assistance tower was installed to alert administrators of any emergencies The system is also used to signal class changes and emergency notifications, such as weather advisories and school-wide lockdowns. In addition, an IS Series rescue assistance tower was installed at the school’s game field to alert administrators of any immediate emergencies occurring outside of the main building. Easy to use systems With the IS Series in place, the administrative staff at Seton Hall can control school entry points. “The Aiphone IS Series works well and is easy to use,” Gallo said. “The video and volume in all elements of this system are clear. We’re also allowed to have remote control over the doors, so we can grant access to people as needed without jeopardizing the student and faculty population by having a single door unlocked all day long. We now know who is in the building at any given time.” The system provides emergency assistance and day-to-day communication throughout the school that had previously been lacking. Response time to anything threatening members of the Seton Hall community is now quicker and handled more efficiently. “This is a true, all-in-one solution that provides educational institutions with entry security, classroom communication, paging, emergency call, and access control,” states Maffey. Overall, Gallo and the Seton Hall Preparatory School staff are impressed with the ease and security offered by the Aiphone IS Series system. “This is what we were looking for. The Aiphone IS Series answers to all the elements of security absent from our daily routine before this,” Gallo said. “This system ensures the safety of our students and faculty, unlike anything we’ve seen in our over 150-year existence.”
ISONAS Inc., an IP access control and hardware solution provider and part of the Allegion family of brands announced that the ISONAS™ Pure IP™ access control solution has been deployed at Our Lady of Perpetual Help Parish in Grove City, Ohio. The parish is comprised of seven buildings, which include the church, preschool, elementary school, rectory, storage garage, athletic building, and modular classrooms. The parish grew from around a dozen visitors daily to more than 80 people visiting the church every weekday morning and more than 500 people visiting over three separate services each weekend recently. Controlling Access The elementary school has grown to host more than 300 students and 50 staff members and volunteers, with the preschool adding another 40 students and staff members to the campus tally. With 28 exterior doors encompassing the fully renovated church, school, and preschool, the parish needed a substantial security upgrade. The new system needed to not just limit access, but also control it. A main challenge at the parish was being able to control access at all seven buildings and provide an environment with improved personal security for their staff, students, and patrons. The security system the parish had in place consisted of a few standalone keypads and electric locks on a couple of doors with no centralized management or communication. Upgrading Security With an influx of people accessing the parish and its facilities, both the facilities director and the maintenance/technology specialist at the parish were ready to find the right access control solution. The new system needed to not just limit access, but also control it. After careful consideration and research, the parish selected the ISONAS™ Pure IP access control solution for their security upgrade. ISONAS introduced the parish to its local certified independent security integrators, Systems 28. “Working with ISONAS on this project was a tremendous experience from start to finish, and we were thrilled to be brought on board to handle this security upgrade,” said Scott Hoover, sales estimator at Systems 28. “As a certified independent ISONAS systems integrator, we were proud to install this unique solution at our local parish and help make our community safer.” ISONAS RC-04 reader controller The parish also liked the fact that an on-site server was not required with the ISONAS solution The project consisted of installing 24 ISONAS RC-04 reader controllers, with 21 deployed on exterior doors and three on interior doors in a month’s timeframe. The parish chose the ISONAS solution for a myriad of reasons, with one main factor being the ability to use power over the ethernet for the card readers and electric locks. The parish also liked the fact that an on-site server was not required with the ISONAS solution, as having a cloud-based server was critical to managing access remotely for multiple buildings. ISONAS Pure Access software “We are extremely happy that the parish selected ISONAS as the right solution for their security upgrade and look forward to providing capabilities to easily expand the system in the future,” said Jonathan Mooney, ISONAS sales leader. The ISONAS system is extremely user-friendly and much more convenient Along with the ISONAS hardware, the ISONAS Pure Access software was deployed for its remote access capabilities. Pure Access™, ISONAS’s software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. Remote access functionality “The ISONAS system is extremely user-friendly and much more convenient than the previous ‘stand-alone’ system we had in place prior to this upgrade,” said Kevin Radwanski, facilities director at Our Lady of Perpetual Help Parish. “We especially like the remote access functionality, as it has been great for us to be able to lock and unlock doors remotely during regular times and emergency situations like the global pandemic.”
Aiphone Corporation (Aiphone), the renowned international manufacturer of intercom and security communication products, has installed its IX Series intercom system at the Roselle Catholic High School in Roselle, New Jersey. Roselle, like many educational facilities across the country, found itself relying on outdated technology and the inability to communicate from classrooms to a main office or centralized security location, a safety risk in any educational institution. IX Series IP Video Intercom System The high school was awarded a grant through the state of New Jersey to implement security improvements. The school chose an Aiphone IX Series Peer-to-Peer IP Video Intercom System, which included two master stations, two video door stations, and 43 audio sub stations to connect each of its classrooms. This new system allows the school’s front office staff to respond to visitor access requests at the main entrance, while also making visual confirmation before admitting anyone inside the building. To handle access requests, the school is equipped with two touchscreen master stations, one located at the front office and the other in the principal’s office. Building-wide pre-recorded notification The Aiphone IX Series can send a pre-recorded notification building-wide An invaluable feature for the school is that it allows teachers to communicate directly to the front office, so that they can also quickly initiate a lockdown to the entire school, in case of an emergency. The Aiphone IX Series can send a pre-recorded notification building-wide, there by alerting students and staff of any threats and providing instructions on what to do next. “With the previous system being unable to talk back to the main office, teachers were left in a bad spot if they ever had to reach an administrator for an emergency,” said Roselle Catholic High School Principal, Tom Berrios, adding “With these improvements, the teachers now feel more secure with what’s going on in the building and they have an easier way to communicate.” ‘Hot button’ capability “This feature is considered a ‘hot button’ capability, because it allows the school to create a pre-recorded message for emergencies,” said Ed Maffey, President of Maffey’s Security Group, the systems integrator tasked with the installation. Ed Maffey adds, “With one push of a button, a pre-recorded message will play continuously and can be used for a variety of scenarios, including fire drills, emergency evacuations, and lockdown situations.”
HID Global, a globally renowned company in trusted identity solutions, has announced that the American School of Guatemala has selected its Seos credential technology to modernize its physical access system. Enhanced campus security The solution significantly improves campus security and traffic efficiency for students and parents, along with enabling staff to easily issue and manage access credentials. “We’ve significantly improved the management of vehicle traffic by reducing the time it takes for parents to access the parking lot. We’ve been able to improve evacuation and emergency processes for our students and staff,” said a spokesperson for the Security Office, American School of Guatemala. Seos credential technology The spokesperson adds, “And, best of all, we have an automated system to manage the entry and exit times of our employees to know where everyone is located on our large campus.” The American School of Guatemala is a private K-12 college preparatory school in Guatemala City, Guatemala. The school partnered with local security integrator, Grupo RQM and HID Global to replace its legacy system, which consisted of written documentation and fingerprint logs. HID readers installed at access points The new system includes HID readers installed at pedestrian and vehicle access points The new system includes HID readers installed at pedestrian and vehicle access points and 1,500 Seos smart cards issued to students, parents and staff. In addition to automating and streamlining access to the school’s buildings, the solution has led to a reduction in the average student drop-off time from 40 to 18 minutes. The school also launched a pilot with HID Mobile Access to allow secure access to the school’s parking lot via mobile IDs stored on smartphones. To gain entry, users simply drive up and hold their mobile phone to a reader, an important feature since most students travel in bulletproof armored vehicles that lack the ability to lower windows. Upgraded security and authentication solutions “The American School of Guatemala’s access control system has all the hallmarks of HID’s industry-renowned security and authentication solutions,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Harm Radstaak adds, “From flexibility and security to ease-of-use, HID’s unique combination of forward-looking technology and intuitive design helps create a robust solution that fortifies the school’s campuses and elevates the user experience.” Due to the successful deployment, school officials plan to replace its traditional key system with Seos smart cards for additional use cases, such as library and student payment services.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Round table discussion
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?
School security: Manufacturers & Suppliers
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload