Security access systems
Ping Identity, the pioneer in Identity Defined Security, announced a significant update to PingOne for Customers, the cloud-delivered Identity-as-a-Service (IDaaS) offering built for developers. The API-first solution can now deliver seamless and secure push notifications from custom mobile applications that can be used for passwordless and advanced multi-factor authentication. The cloud identity solution helps development teams speed time to launch their applications, while also taking securit...
From small-town dental offices to major hospitals, healthcare facilities of all kinds need to be safe, secure, and protected. Security guards are often needed in emergency departments, quality doors and windows need to be installed to prevent unwanted entry or escape, and employees need to handle every situation with care to avoid malpractice claims. These aspects are crucial for a medical facility's success, however, there is another major factor that needs to remain top of mind: cybersecurity....
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, will host the second annual Cloud Access Summit on June 13, 2019 in Salt Lake City, UT. This exclusive event for dealers, integrators and security professionals offers a day packed with educational sessions focusing on the hottest industry trends and topics related to cloud access and its many complementary technologies, presented by executives and thought leaders representing a cross-sect...
The Security Industry Association (SIA) has named Sen. Amy Klobuchar (D-Minn.), Sen. Deb Fischer (R-Neb.) and Rep. Donald Payne, Jr. (D-N.J.) as the 2019 recipients of the SIA Legislator of the Year Award. The awardees will be honored at the upcoming SIA GovSummit, taking place June 26-27 in Washington, D.C. The SIA Legislator of the Year Award is presented annually to members of Congress and other elected officials who have demonstrated extraordinary leadership in advancing legislation and pol...
Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe program. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a program of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam&rs...
Check Point Research, the threat intelligence arm of Check Point Systems Inc., has announced the creation of a new online vulnerability repository, CPR-Zero. Going forward, Check Point will publicly list all vulnerabilities its research teams find, even if they are not featured in a publication on the Check Point Research blog. The move makes Check Point the industry’s largest cyber security vendor to openly share such vital information online. CPR-Zero vulnerability repository "Not every vulnerability that we find leads to a blog post or publication. In fact, most do not,” said Omri Herscovici, Head of Vulnerability Research at Check Point. "This is why it’s important for us to share our findings using the CPR-Zero platform. The information listed on CPR-Zero will be a priceless resource for citizens and enterprises everywhere to be more informed and vigilant against the latest cyber-security threats.” CPR Zero has initially launched with over 130 vulnerabilities and will quickly expand to offer a comprehensive library of all vulnerabilities that Check Point’s research team has uncovered, both historic and in the future. CPR Zero lists CVEs with links and references for viewers to learn more from the official CVE database. The list also contains detailed information regarding each vulnerability, including a crash and dump, a short explanation and sometimes a POC. Enhanced cyber security Check Point’s mission is to make the online world a safer place to live in" The repository will be continually updated with new discoveries. However, Check Point reserves the right to not publicly disclose major vulnerabilities that may be at a high risk of being exploited before patches or updates are widely available. "Check Point’s mission is to make the online world a safer place to live in. To help us further get there, we are making the bold move to be the largest cyber security company in the industry to share ALL our technical CVE findings with everyone," said Neatsun Ziv, VP of Threat Prevention. “No other cyber security company of our size has taken this step." Greater customer and enterprise security Built by some of some of the most talented and capable experts in the field, CPR Zero is Check Point’s latest initiative in responsibly notifying both consumers and enterprise organizations of new cyber-security risks, as well as encouraging vendors to take the necessary steps to continue to provide a risk-free user experience.
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable biometric enrollment and identification solution for law enforcement, border control and national ID programs – all from the convenience of an Android mobile device. Users of the iCAM M300 can extend their door-mounted iris readers using a cloud-based mobile server that automatically syncs all users, access and activity data. Handheld solution for iris authentication It is exciting to partner with Iris ID to provide a powerful handheld solution for iris authentication"“The addition of the Telaeris XPressEntry software enables us to add important new functions for our commercial and government customers,” said Mohammed Murad, vice president global sales and business development, Iris ID. “The iCAM M300 is now ideal for virtually any use requiring mobile identity authentication.” "It is exciting to partner with Iris ID to provide a powerful handheld solution for iris authentication," said David Carta, chief executive officer, Telaeris. "Iris ID's multimodal device, combined with XPressEntry from Telaeris, allows security integrators and end users to easily integrate mobile iris identification technology into their existing physical access control infrastructure." FBI-Compliant 500DPI fingerprint collection The iCAM M300 has embedded cameras for simultaneous capture of both iris and facial modes. An optional snap-on module provides for an FBI-compliant 500DPI, single fingerprint collection. Also included are magstripe and contactless card support, as well as an MRZ reader to verify ePassports. Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, and 4G LTE. The Security Industry Association named the iCAM M300 the best mobile app in the 2018 New Product Showcase.
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces its Digital Hood Defense for ATM security. Compatible with S&G’s Digital Platform products, this innovative device increases the overall security of ATM units by protecting the hood from jackpotting attacks - whereby malware has been attached to an ATM to rapidly access money - without compromising convenience for operators. Digital Hood Defense for ATM security The Digital Hood Defense wires through the same keypad as the vault lock, allowing the user to easily control access to their hood, vault or both The Digital Hood Defense wires through the same keypad as the vault lock, allowing the user to easily control access to their hood, vault or both depending on the paired vault lock. After installing the latest update, Digital Hood Defense works directly through existing lock software. When paired with the Digital Platform keypad, this lock records both hood and vault access - up to 1,000 time- and date-stamped events - enhancing ATM security, management and oversight while making the unit impervious to hood tampering. “Jackpotting has been on the rise worldwide in recent years and ATM vaults are not the only layer that needs protection,” said Keith Deaton, COO of Sargent and Greenleaf. “Increasing physical security for existing ATM unit can help mitigate attacks, and, as the name suggests, Digital Hood Defense adds additional security for the entire unit, making it a complete locking solution against attacks,” said Deaton. S&G Digital Hood Defense main features: Secures ATM hood with S&G’s Model 1004 lock body Digital Hood Defense is managed through the existing vault lock keypad Keypad eliminates the need for standard cylinder keys Pair with A-Series with Display (ASWD), Audit 2.0 or Digital Time Lock Digital Hood Defense can be retrofitted with any new Digital Platform ATM lock or bundle the accessory with your next lock purchase and installation.
Ping Identity, global provider of Identity Defined Security solutions, announced its participation at Identiverse 2019, slated to take place from June 25-28 in Washington, D.C. Company experts will share best practices in working toward digital transformation, address the current state of the industry and provide ways enterprises can elevate their identity security programs. Attendees also will have an opportunity to hear from Ping Identity customers eBay and Royal Dutch Shell, as they talk through their successful deployments. Andre Durand, Ping Identity’s CEO, will kick off the conference in the opening keynote on June 26 at 8:30am ET. With a focus on highlighting the importance of forecasting the timing and impact of industry disruptions, the presentation will help security professionals prioritize investments in digital identity. Attendees will walk away with knowledge to help prepare their organizations for success in volatile conditions. Identity and access management Ping experts, spanning the company’s product marketing, product management and engineering groups, will also speak on a variety of themes and topics, including the following: API Security Multi-Factor Authentication Identity and Access Management Open Banking Identity Authentication Ping Intelligent Identity platform Make a memorable stop at Ping’s booth #601 to participate in several fun activities, including: Take a virtual hot air balloon ride, showcasing updates to the Ping Intelligent Identity platform experience and cloud offerings. Learn about the company’s new Pingtopia community, which brings together customer advocates. Download free trials of Ping’s Cloud MFA & SSO, PingOne for Customers and PingIntelligence for APIs solutions.
According to a recent report published by business intelligence provider IHS Markit, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, was named the world’s number one vendor of Video Management Systems (VMS). IHS-reported results from 2015-2018 also point to the company sustaining a 24.1% CAGR (compound annual growth rate) for the past 3 years in this category. In the Americas, Genetec remains the leading VMS manufacturer by a wide margin for eight consecutive years, with an 18.3% share of this $4.1 billion market. Genetec has also taken the number one position in the $1.7 billion market for back-end video surveillance equipment in the Americas. In the rest of the world, Genetec grew its VMS revenue at a fast rate: In EMEA, Genetec revenues grew by 20.5% in 2018, while in APAC (excluding China), Genetec grew its revenues by 22.5%. IP-Based physical security solutions Our independence and single-mindedness have helped us earn the trust of enterprise and government users"“As a privately owned, independent manufacturer of IP-based physical security solutions, we reinvest a much higher proportion of our annual top-line revenue into R&D than most,” states Pierre Racz, President, Genetec Inc. “Our independence and single-mindedness have helped us earn the trust of enterprise and government users. We want to delight the customer. Circumstances have propelled us to be outspoken about privacy and cyber-security.” “These factors, along with good-fortune, strong partnerships and a great team, are some of the factors that explain the appeal of our solutions,” explains Racz. "We will continue to lower the friction with which our customers integrate new sensors and other systems into the decision-making of their operations.” According to IHS Markit (2017 Video Surveillance Market Share Database, 2017 Access Control Intelligence Database, and 2018 ANPR & Detection Sensors Report), Genetec is the only security and public safety solutions developer to hold top-10 global rankings across all physical security industry sectors including video management software (VMS), access control software, and automatic license plate recognition (ALPR) software.
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end users with the highest level of flexibility and ease of operation, PAC & GDX have joined forces with STid, the principal manufacturer of instinctive, contactless security technologies. NFC based readers By incorporating STid’s Bluetooth and NFC based readers with PAC or GDX controllers, a mobile phone can be used to gain access. To enjoy all the benefits of a handsfree option, all an individual has to do is tap their phone twice and the Bluetooth signal is sent to the reader to unlock a door. By downloading the STid app a virtual credential can be configured in a smartphone wallet By downloading the STid app a virtual credential can be configured in a smartphone wallet, allowing the user to have multiple virtual ‘keys’ for different areas or sites. The system can also be configured to use proximity based near field communication (NFC) instead of Bluetooth, or a combination of the two. Furthermore, it is available with a PAC or PAC 64 output and, when using a PAC 512 or PAC 212 access controller, two readers can be connected to provide true read in/out from a single channel. Access control systems Also on display is the PAC Residential Cloud solution, which leads the way in allowing organizations to remotely manage and monitor their access control systems in a secure, modern and cloud based environment. Users can address technical issues, deal with key fob management, view status, set and unset a system, and gain access to an event log more easily than ever before – all from a remote location. Various site communication options are available including PSTN, GSM and GPRS and it can be configured and managed via a smartphone, tablet or PC. At IFSEC PAC is demonstrating how Residential Cloud can be integrated with 3xLOGIC cameras to provide a fully hosted solution, which is perfect for the residential sector. This system allows designated personnel to be notified if, for example, a door is forced or left open. Network switches By sending an alarm to the camera, it starts to record and transmits images to a mobile device via a push notification. This allows the system to provide vital information that elicits a fast response and immediate action. With an optional camera, a backlight LED to provide clear visitor images in low light levels Sharing the limelight with STid and Residential Cloud is GDX7 – a next generation IP based door entry system that offers integrated access control for up to 1,000 keyholders using a standard two-core cable. With an optional camera, a backlight LED to provide clear visitor images in low light levels, and an inbuilt reader, GDX7 has an incredibly high level of functionality and enables integrators to install an IP system without being skilled in IT or familiar with network switches. Identification devices The GDX7 door entry panel can be provided with multiple button options, including those that meet the requirements of the Equality Act, and its readers and identification devices have also been approved by Secured by Design – a police service initiative that aims to improve the security of buildings. Already a huge success, GDX7 has a new seven-inch apartment station and a new landing card, which enables it to provide up to 96 handset connections. It too has recently been augmented with STid integration providing property owners, engineers or contractors with a flexible way of gaining access to remote properties. “PAC & GDX are driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” commented David Hughes, the company’s global product manager. “We also pride ourselves on our customer service and technical support, which includes the provision of a new online training platform that offers a great way to get the most out our products.”
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-Expanding Edge Devices Market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud Computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge Computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralized cloud computing and even coins the phrase, “Cloud computing, decentralized” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost Efficiency Of Edge Processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilizing edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilizing edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organizers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favorite soccer team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defense & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritized, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a soccer game. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organizers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organizers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same soccer team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Who is more likely to rob your home – a friend or a stranger? Is a burglary more likely to occur when you are at home or away? Does gun ownership contribute to more effective home security? What about a loud, barking dog? A recent survey by Reviews.org considered these and other consumer preconceptions about home security and how they compare with the facts. "Everyone wants to feel safe at home but not everyone knows which home safety measures will actually help protect them,” says Mindy Woodall, Reviews.org’s Home Security Expert. “This survey was interesting because it gives us a better idea of how some people think about home security and what measures they personally feel they should take to protect themselves and their families, as well as how their chosen methods compare to what experts say actually works." Survey results and facts Here are some of the survey’s results (compared with the facts, according to experts): Survey results: 50.4% of respondents thought a stranger is most likely to rob them, while 28% thought a friend (even a social media friend) is most likely to rob them. Another 21.6 percent thought a family member most likely to rob them. Fact: In robberies, 65.1% of attackers are someone the victim knows. In nonviolent robberies, 30% of attackers are known to the victim, 24% are strangers, and 46% are unable to be identified. Survey results: Guns were voted as providing the most effective home security by 24.4% of respondents, while 20.6% rated them as least effective. The next highest percentage, 22.8%, thought a professional home security system is the most effective. Only 11.8% of people thought dogs to be the most effective method for home security, although burglars often recommend a loud dog to deter theft (it ranked third most effective). Fact: Residents are three times more likely to be robbed if they don’t have a security system. Time when burglary takes place Survey results: 89.4% of people (correctly) thought that they are most likely to be burglarized when away from home. Survey results: 44.2% of people thought that burglaries occur in the middle of the night, between midnight and 5 a.m. (which conflicts with the above stat because most people are at home during those times.) Fact: Burglaries are more likely during the day, between 10 a.m.– 3 p.m., when people are away from home for work and errands, and kids are at school. Survey results: 50.8% of respondents don’t think burglars knock on the door before breaking in. Fact: Burglars often knock on the door before entering. It’s a good way to see if anyone is home, or if there is a big noisy dog on the premises. If anyone answers, they often say they were looking for their friend’s house, need directions, or will offer cleaning/repair services. The survey results from consumer website Reviews.org are based on a survey of 500 people in the United States of varying ages and locations to find out what they thought they knew about home break-ins, robbers, and burglars.
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new program will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and center, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the program of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organizations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defense & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
People’s Choice Credit Union is one of Australia’s largest Credit Unions, with 365,000 members and 44 locations across South Australia, Northern Territory, Victoria, Western Australia, and Australian Capital Territory. People’s Choice Credit Union (People’s Choice) has earned a reputation as a forward-thinking and highly innovative company that is radically changing the banking experience for its members and employees. From their head-office to their branches throughout Australia, People’s Choice is utilizing new technology to improve service to members, be more efficient, reduce costs, and decrease their environmental footprint. Smarter workspaces Operating an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks, People’s Choice staff are not allocated a specific desk but instead choose where they wish to sit each day. They can even choose whether they wish to sit or stand, by having desks that can be raised or lowered to suit personal preference. Flexible work environments are proving popular for large corporate companies due to the ability to increase company-wide communication, support project work, improve productivity, reduce clutter, and save costs. “With a large staff, there is always a number of people out of the office, whether it’s on sick or annual leave, or working on business outside of the office.” said Mike Humphrey, Manager of Property Services at People’s Choice Credit Union. “By implementing a flexible workspace model, we have been able to save approximately 3,000 square meters of office space which equates to thousands of dollars each year in building costs” said Mike. Multi-technology smartcard T20 and T10 readers Using Gallagher’s smartcard T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker To facilitate the operation of a flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), People’s Choice uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, People’s Choice has a simple to operate, customizable system that enables staff to carry just one card on site. “We’re all about putting people first. As an organization we’re not afraid to try new ways of doing things, and as a result we’re seeing significant improvements for our members and staff.” Mike Humphrey, Manager of Property Services, People’s Choice Credit Union. Command Center Mobile App Utilizing Gallagher’s innovative Command Center Mobile App, key facilities management personnel are able to manage access remotely using their mobile phone. “Occasionally staff forget their access card and I’ll get a phone call to open their locker for them. Being able to access the platform and administer overrides using my phone, from wherever I am at the time, is huge for me” said Mike “and it speeds things up considerably for the employee”. With people working in different areas at different times, People’s Choice needed a printing solution that simply and easily enabled staff to retrieve printed documents from the nearest printer. People’s Choice was also looking for a solution that helped to cut down on unnecessary waste. Follow-Me Printing solution To meet both of these needs, People’s Choice installed Follow-Me Printing. This printing solution stores print jobs electronically until a user badges their Gallagher access card at a printer to retrieve their files. At this point, the user can terminate any print jobs they no longer need, cutting down on waste. The solution further reduces waste through a configuration that deletes any printing jobs that haven’t been actioned within a 24 hour period. “One of the truly efficient things about our set-up is that our printing integrates with our access control solution.” said Mike. “It means that staff only have one card for all of their access needs on site; they can access the various office floors, lockers, and printers all with a single card, instead of also having keys and pin numbers to manage.” Temperature management solution Any change in temperature beyond the set limits, triggers an alarm notification Through a Gallagher Bacnet integration, People’s Choice has implemented an automated, continuous temperature management solution for the large data center located at their head office. With temperature sensors communicating directly with Command Center, any change in temperature beyond the set limits, triggers an alarm notification to be sent directly to Mike’s phone. According to Mike “The capability for Gallagher’s platform to send critical information, like the potential overheating of a server room, straight to my phone was a big selling point for us. It provides a simple mobile solution to mitigate a considerable business risk.” Visitor management To support efficiency at their head office reception area, People’s Choice chose Gallagher’s Visitor Management Client and Self-Registration Kiosk. The self-registration kiosk serves as an ideal “extra lane” during particularly busy periods, ensuring that visitors are able to register their arrival quickly and effortlessly without delay. The integration between Gallagher’s visitor management solution and Command Center, ensures that a comprehensive audit trail of all visitor management events, including visitor pre-registration, escort, host, and visitor actions, is securely stored and can be easily retrieved to produce reports.
The American University of the Middle East (AUM) in Egaila is the largest private university in Kuwait. Its extensive campus is spread over 261,190 square meters of beautiful grounds, including academic buildings, technical labs, AUM library, AUM Sports Center, outdoor sports playgrounds including a FIFA certified football field, AUM Opera House, AUM Conference Center, parking areas, administrative and service areas. The American College of the Middle East (ACM) is also hosted within the campus. With sizeable grounds and multiple institutes of learning operating on site, AUM’s access control requirements were complex. The popularity of the campus with not only AUM students but also Kuwaiti youth in general meant AUM needed to ensure the right access was provided to the right people at multiple points on campus. AUM’s Director of IT highlights the challenge the administration faced in efficiently identifying, authenticating and providing access for more than 800 employees and over 10,000 students. “The campus needed to be secure, but at the same time easy to use, causing no inconvenience to students and staff.” Gallagher Command Center AUM needed a dynamic solution that met their access control requirements AUM needed a dynamic solution that met their access control requirements, could integrate with their core enterprise resource planning (ERP) solution, and was scalable to accommodate future growth. Gallagher’s access control solution, featuring Gallagher Command Center and a range of integrations, was selected as the university’s preferred choice, meeting its requirements in the best possible way. MIFARE contactless smart cards Student and staff ID cards became part of the access control system with MIFARE contactless smart cards provided to students, faculty and staff. Turnstiles installed at the entrances to AUM and intelligent integrations with existing systems provided total control of movement within the campus. AUM uses learning software and automated systems widely across its campus. Extensive integration with the Gallagher solution has significantly reduced operational costs, creating efficiencies for staff and students and enhancing the overall security system. “Gallagher gives us the best option to fulfill our requirements, with a total solution,” says the university’s Director of IT. Integration with CCTV system Exam control rooms at AUM need to be fully secure. Command Center integrates with the CCTV system to ensure that when movement is detected, or someone tries to open the door, the CCTV is triggered, and a photo attached to the security report. Within the campus, access permissions need to be well defined for different groups. Access to the gymnasium, library and sports center is defined by male and female, staff and students. Command Center allows AUM to define these access controls in the directory, ensuring they happen automatically. Fully automated access control Fully automated access control gives us confidence in the system" “Fully automated access control gives us confidence in the system,” says the university’s Director of IT. “We don’t have to worry about it.” The reporting capabilities of Command Center provide AUM with greater control and audit information. The university is governed by a council, that regularly conducts audits. “The Gallagher solution helps us easily produce daily reports to meet those reporting requirements. It’s a fantastic solution, no doubt." The integrated booking system in the library controls access to study rooms, giving entry only to those who are included in the room booking. Staff and students no longer have to manage who is in the rooms, allowing them to get on with their work and study. The university’s Director of IT says in the past, monitoring and reviewing this information would take a person two or three days. “With this small integration from Gallagher, turnaround time has improved to within half a day for the same task.” Restricted access He adds, “Campus access for dismissed students has been prevented. Their access is automatically restricted by the admin department. Student’s whose access has been prevented can visit the admin department to rectify their enrollment status. The integration with the Gallagher solution is amazing. Our operational costs have been reduced wherever it is used.” With new construction underway and increasing popularity with students, AUM is a growing university. The Gallagher solution is growing alongside it, providing regular updates and new innovations. “Gallagher often contacts us about new initiatives and things they are introducing,” says AUM’s Director of IT. “We will implement them, because of the success of the current solution. We try at every point to take full advantage of the features offered to keep reducing operational costs. From an industry perspective, it’s a beautiful solution.”
Village Roadshow Theme Parks (VRTP), Australia’s largest theme park operator, provides some of the most thrilling entertainment rides and slides available anywhere in the world. With its headquarters located on the Gold Coast, Australia’s holiday playground, it operates: Warner Bros. Movie World Wet ‘n’ Wild Water World Australian Outback Spectacular Sea World Paradise Country Sea World Resort and Water Park Over 5 million visitors per year, from families to thrill seekers, flock to this world of fun with action-packed shows and rides, marine and animal attractions, and adventure across seven large scale properties. Monitoring from Command Centre This enables monitoring from the Command Centre in the Gold Coast over all seven sites streamlining operationsWhen it comes to security, VRTP have always chosen access control and perimeter solutions supplier Gallagher as their long-term partner. A relationship that began in the mid-1980s, has grown to meet the expanding demands of each park. VRTP recently opened a new Wet ‘n’ Wild in Sydney, New South Wales, in December 2013. Two new parks based on Sea World and Wet ‘n’ Wild are currently under construction in Hainan, China. Wet ‘n’ Wild Sydney, opened to the public in December 2013, demonstrates Gallagher’s ability to extend security coverage across States, with its scalable and flexible solution. This enables monitoring from the main Command Centre in the Gold Coast over all seven sites streamlining operations. In the event of power loss from the main controller in the Gold Coast, Sydney sites have their own server backups to continue operations as normal. RFID wrists bands for staff access The model that VRTP and Gallagher have designed enables various operator levels to have separate divisions for creating cardholders. Different operator levels have authorized access to develop card holders for their sections. There are approximately 3,000 cardholders at all parks and growing. Wet ‘n’ Wild Sydney is the first Village Roadshow park to deploy staff RFID wrists bands that give them access to areas restricted by the public. Command Centre technology has given VRTP total site security across all parks VRTP’s guard workforce has been complimented by the Gallagher system working seamlessly together. Command Centre technology has also given VRTP total site security across all parks; within a year saving park operations approximately 20 hours a day in labor costs. Better visibility of services Gallagher delivers building automation and control through a high-level interface that provides strong communication between Gallagher Command Centre and the theme parks’ building systems. This has enabled integration to seven main panels and sub panels across the group giving security staff better visibility of all services, at all times. Efficiencies in alarm generation have improved with automatic escalation to the necessary staff member in a timely manner. Key industry challenges Health, safety, risk mitigation, and public relations Preserving assets and ambience Using integration to save costs and improve security efficiencies Gallagher technology used Gallagher Command Centre Gallagher T-Series Access Control Readers Gallagher high level video integration – more than 250 cameras Protection of marine animals Gallagher’s integrated security solution provides continuous surveillance across the parksAnimal safety and care is critical. Sea World is Australia’s premier marine park, with over 25 hectares (55 acres) of land. With a range of dolphins, seals, sharks, polar bears, and other marine life – their safety, and the reputation of Sea World, must be preserved. This also includes protecting Australian Outback Spectacular and Paradise Country animals and wildlife. Alongside video and alarm integration, Gallagher manages all primary entry points into parks. Once inside the parks, it manages restricted zones which include secured enclosures, particularly important for Sea World. Gallagher’s integrated security solution provides continuous surveillance across the parks, capturing any incidents which may occur on site. This is particularly important for Wet ‘n’ Wild water park which faces increased risk due to the nature of the environment. Wet ‘n’ Wild has been one of the group’s most successful theme parks with a growing attendance of approximately 1 million visitors every year. Investing in robust integrated system The VRTP security team has the ability to monitor and control from one locationVRTP are continually looking for ways to improve park operations, infrastructure, and processes to meet the needs of visitors and staff. With security taking a precedence in the last five years, VRTP made the decision to invest in a robust integrated system that to the public eye would go unseen. Gallagher’s strong history of service and the scope of their integrated security solutions gave VRTP confidence in selecting Gallagher for their upcoming internal infrastructure developments. With 250 cameras located discretely around all seven of VRTP’s properties, integrated back to the central control platform Gallagher Command Centre, the VRTP security team has the ability to monitor and control from one location. Intruder alarm management solution The integrated system plays an important role in securing the site overnight from would-be intrudersIn the Village Roadshow Studios, much importance is placed on securing assets, and protecting the privacy of high-profile guests. The Studios have attracted projects with a combined budget of around 2.5 billion dollars. There are eight large sound stages covering 10,844m2 (116,727 sq. ft), confirming it as one of the largest studios in the Southern Hemisphere. With intellectual property and assets that must be protected, the Gallagher 24-hour camera integration and intruder alarm management solution play a key role in protecting staff, visitors, and monitoring employee cash handling and service. The integrated system also plays an important role in securing the site overnight from would-be intruders. Duress alarm monitoring is a central integration used by security staff with 70 alarm zones across all parks. In the event of an emergency, a wireless help-call system can identify back to the Command Centre the name, description, and location via a detailed site plan for each park. This is a vital security element for protecting captive mammals and animals, and IT infrastructure.
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognized by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centers. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
The first forensic science-based crime prevention system in New York State was installed at luxury Swiss watch manufacturer, Richard Mille. It is the fourth system to be deployed in the United States. The technology, the Intruder Spray System from SelectaDNA, utilizes forensic science to reduce burglary, robbery and high-value theft by a documented range of 40 to 86 percent. The cutting-edge technology was installed at the world-renowned watch brand’s architecturally stunning flagship boutique, located on ‘Billionaire’s Row’ on 57th Street in Manhattan. Irrefutably identify criminals The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory The system uses the power of forensic marking science to considerably deter crime and, if a crime is committed, enhances law enforcement ability to irrefutably identify criminals, then apprehend and prosecute them. The technology has been used for more than ten years in 46 countries on five continents. It is now available and beginning to be deployed in the United States. The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory. It is scientifically structured, and functions, the same as organic DNA – but is more durable. Each unit of the forensic solution contains a universally unique code (sequence), which is never replicated; thus; providing an exclusive identifying marker for each client. Each unique forensic code provides an uncontestable link between a criminal, or stolen item, to a specific crime scene and the rightful owners. Remote video monitoring The system – comprised of a control box, spray head and PIR – is easily integrated with other security systems such as burglary, access control, intrusion, video, and many others. Installations take approximately four hours. The system can also be installed as a standalone crime-fighting solution. There are various modalities of system activation, including but not limited to panic buttons, money clips, remote video monitoring via Milestone Systems, RFID and facial recognition technology. When the system is activated, the invisible, non-toxic and water-based forensic solution remains on marked criminals’ skin for four to six weeks, and clothing for two to three months. The solution is only visible via a special frequency UV light, leaving criminals exposed to identification and apprehension well after leaving the crime scene. Crime-fighting technology SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime" “We’re pleased to provide Richard Mille with a proven crime-fighting technology to further enhance its already impressive security measures,” said Henrik Olsen, CEO of CSI Protect, the exclusive provider of SelectaDNA technology in the United States. “SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime across the globe and now in the United States.” Many Fortune 500 and iconic, well-known companies have used SelectaDNA technology, including, Tag Heuer, LVMH, Chanel, Pandora, Watchfinder & Co., 7-Eleven, Circle K, G4S, Securitas, GlaxoSmithKline, Lloyds Bank, The Royal Bank of Scotland (RBS), Bank of New Zealand, McDonald’s, KFC, Balfour Beatty, Shell, Texaco, Raptis Rare Books and thousands of others. Offender marking solutions The co-founder of Milestone Systems, Henrik Friborg Jacobsen, is a major proponent of the technology and anticipates major growth of its use in the United States. Friborg Jacobsen is also an investor in, and chief advisor to, CSI Protect. SelectaDNA is a pioneer in forensic marking offering a full range of property, infrastructure and offender marking solutions, using a completely secure and unique forensic technology. SelectaDNA, which is water-based, non-toxic and non-flammable, is proven to reduce crime (especially robbery, burglary and high-value theft) by up to 86%. SelectaDNA not only reduces crime, but also enables law enforcement to link criminals to crime scenes and secure convictions.
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralized operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralized operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
Round table discussion
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?